Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             26 results found
no title author magazine year volume issue page(s) type
1 Anti-virus solution for firewalls Zenkin, Denis
2000
2000 5 p. 6-
1 p.
article
2 Automatic fax security 2000
2000 5 p. 5-6
2 p.
article
3 Company wins legal fight in US on spam Hill, Pamela
2000
2000 5 p. 3-
1 p.
article
4 Continuous Internet monitoring for fraud protection 2000
2000 5 p. 6-
1 p.
article
5 Encryption needed to secure video conferencing 2000
2000 5 p. 2-3
2 p.
article
6 Fraud risk training course Findlay-Wilson, Louise
2000
2000 5 p. 3-
1 p.
article
7 Hacker pleads guilty 2000
2000 5 p. 4-5
2 p.
article
8 (In)Famous Predictions Luzwick, Perry
2000
2000 5 p. 16-17
2 p.
article
9 Internet-based insider trading Gengler, Barbara
2000
2000 5 p. 7-
1 p.
article
10 Internet users fear their identities may be stolen 2000
2000 5 p. 2-
1 p.
article
11 Israeli sites 28% vulnerable 2000
2000 5 p. 5-
1 p.
article
12 Microsoft Outlook attracts more worms 2000
2000 5 p. 1-
1 p.
article
13 $15 million funding to combat hackers Browne, Ray
2000
2000 5 p. 5-
1 p.
article
14 New security alliance Gengler, Barbara
2000
2000 5 p. 7-
1 p.
article
15 60% of UK companies have suffered a security breach 2000
2000 5 p. 4-
1 p.
article
16 Online Dispute Resolution: Review of Initiatives Worldwide Ott, Rachael
2000
2000 5 p. 13-15
3 p.
article
17 PKI revenues set to grow Rao, Krishna
2000
2000 5 p. 3-4
2 p.
article
18 Privacy Issues Re-emerge Madsen, Wayne
2000
2000 5 p. 15-
1 p.
article
19 Roll up your sleeves and get checking! Dwan, Berni
2000
2000 5 p. 8-
1 p.
article
20 SmartGate extends the corporate firewall 2000
2000 5 p. 6-
1 p.
article
21 Techno-Crimes and Criminal Justice Systems 2000
2000 5 p. 18-19
2 p.
article
22 The Changing Face of International Cryptography Policy Herson, David
2000
2000 5 p. 9-10
2 p.
article
23 The Double-Edged Sword of the Net: Turning E-Porn into E-Productivity Draycott, David
2000
2000 5 p. 11-12
2 p.
article
24 Universal security server for E-commerce McDermott, Paul
2000
2000 5 p. 5-
1 p.
article
25 Web hotline launched for safe Internet use Jansen, Ton
2000
2000 5 p. 3-
1 p.
article
26 Worm attempts to call the 911 emergency service Wee, Yunsun
2000
2000 5 p. 2-
1 p.
article
                             26 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands