Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             29 results found
no title author magazine year volume issue page(s) type
1 Annual conference on control, audit & security of information systems 1998
1998 10 p. 20-
1 p.
article
2 A strange brew for Java 1998
1998 10 p. 2-
1 p.
article
3 Audit and security of sap r/3 1998
1998 10 p. 20-
1 p.
article
4 Biometrics 98 1998
1998 10 p. 20-
1 p.
article
5 Biometrics provide medical records security 1998
1998 10 p. 3-
1 p.
article
6 Company claims to eradicate millennium bug 1998
1998 10 p. 5-
1 p.
article
7 Compsec international '98 1998
1998 10 p. 20-
1 p.
article
8 Computer security conference and exhibition 1998
1998 10 p. 20-
1 p.
article
9 Disaster recovery facilities expanded in Docklands 1998
1998 10 p. 6-
1 p.
article
10 Holding resellers to ransom Parry, Rex
1998
1998 10 p. 15-17
3 p.
article
11 Infosecurity scotland 98 1998
1998 10 p. 20-
1 p.
article
12 Internet security masterclass 1998
1998 10 p. 20-
1 p.
article
13 Massive surge in quarantined E-mail 1998
1998 10 p. 3-
1 p.
article
14 Media vision indictments Gengler, Barbara
1998
1998 10 p. 7-
1 p.
article
15 Men prefer to fix disasters themselves 1998
1998 10 p. 3-
1 p.
article
16 Midland gets new network-based banking application 1998
1998 10 p. 4-
1 p.
article
17 Mission-critical server suites for Windows NT 1998
1998 10 p. 5-
1 p.
article
18 Network breaches: They are real Hancock, Bill
1998
1998 10 p. 8-11
4 p.
article
19 ONTRACK launches free Y2K audit software 1998
1998 10 p. 6-
1 p.
article
20 Resellers get comprehensive security solution 1998
1998 10 p. 4-
1 p.
article
21 SAP in $500 million lawsuit Sterlicchi, John
1998
1998 10 p. 7-
1 p.
article
22 Smart card security and applications Dwan, Berni
1998
1998 10 p. 18-19
2 p.
article
23 Survive! 10th annual business continuity conference and exhibition 1998
1998 10 p. 20-
1 p.
article
24 Tamper-resistant security for E-business applications 1998
1998 10 p. 5-
1 p.
article
25 Twelve reasons why people aren't responding to the Y2K challenge Wood, Charles Cresson
1998
1998 10 p. 12-14
3 p.
article
26 Unauthorized Web access a virus risk 1998
1998 10 p. 2-
1 p.
article
27 Users get direct access to anti-virus research centre 1998
1998 10 p. 6-
1 p.
article
28 Virus bulletin international conference '98 1998
1998 10 p. 20-
1 p.
article
29 Worldwide collaboration for secure military messaging 1998
1998 10 p. 4-
1 p.
article
                             29 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands