no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Annual conference on control, audit & security of information systems
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
article |
2 |
A strange brew for Java
|
|
|
1998 |
1998 |
10 |
p. 2- 1 p. |
article |
3 |
Audit and security of sap r/3
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
article |
4 |
Biometrics 98
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
article |
5 |
Biometrics provide medical records security
|
|
|
1998 |
1998 |
10 |
p. 3- 1 p. |
article |
6 |
Company claims to eradicate millennium bug
|
|
|
1998 |
1998 |
10 |
p. 5- 1 p. |
article |
7 |
Compsec international '98
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
article |
8 |
Computer security conference and exhibition
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
article |
9 |
Disaster recovery facilities expanded in Docklands
|
|
|
1998 |
1998 |
10 |
p. 6- 1 p. |
article |
10 |
Holding resellers to ransom
|
Parry, Rex |
|
1998 |
1998 |
10 |
p. 15-17 3 p. |
article |
11 |
Infosecurity scotland 98
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
article |
12 |
Internet security masterclass
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
article |
13 |
Massive surge in quarantined E-mail
|
|
|
1998 |
1998 |
10 |
p. 3- 1 p. |
article |
14 |
Media vision indictments
|
Gengler, Barbara |
|
1998 |
1998 |
10 |
p. 7- 1 p. |
article |
15 |
Men prefer to fix disasters themselves
|
|
|
1998 |
1998 |
10 |
p. 3- 1 p. |
article |
16 |
Midland gets new network-based banking application
|
|
|
1998 |
1998 |
10 |
p. 4- 1 p. |
article |
17 |
Mission-critical server suites for Windows NT
|
|
|
1998 |
1998 |
10 |
p. 5- 1 p. |
article |
18 |
Network breaches: They are real
|
Hancock, Bill |
|
1998 |
1998 |
10 |
p. 8-11 4 p. |
article |
19 |
ONTRACK launches free Y2K audit software
|
|
|
1998 |
1998 |
10 |
p. 6- 1 p. |
article |
20 |
Resellers get comprehensive security solution
|
|
|
1998 |
1998 |
10 |
p. 4- 1 p. |
article |
21 |
SAP in $500 million lawsuit
|
Sterlicchi, John |
|
1998 |
1998 |
10 |
p. 7- 1 p. |
article |
22 |
Smart card security and applications
|
Dwan, Berni |
|
1998 |
1998 |
10 |
p. 18-19 2 p. |
article |
23 |
Survive! 10th annual business continuity conference and exhibition
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
article |
24 |
Tamper-resistant security for E-business applications
|
|
|
1998 |
1998 |
10 |
p. 5- 1 p. |
article |
25 |
Twelve reasons why people aren't responding to the Y2K challenge
|
Wood, Charles Cresson |
|
1998 |
1998 |
10 |
p. 12-14 3 p. |
article |
26 |
Unauthorized Web access a virus risk
|
|
|
1998 |
1998 |
10 |
p. 2- 1 p. |
article |
27 |
Users get direct access to anti-virus research centre
|
|
|
1998 |
1998 |
10 |
p. 6- 1 p. |
article |
28 |
Virus bulletin international conference '98
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
article |
29 |
Worldwide collaboration for secure military messaging
|
|
|
1998 |
1998 |
10 |
p. 4- 1 p. |
article |