Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             26 results found
no title author magazine year volume issue page(s) type
1 Anti-virus software reports on Windows registry changes Zenkin, Denis
2000
2000 6 p. 6-
1 p.
article
2 Biometrics secures Sun’s Java Card Marshall, Elizabeth
2000
2000 6 p. 5-
1 p.
article
3 Business continuity research highlights problems 2000
2000 6 p. 3-
1 p.
article
4 Changes proposed to FOIA Madsen, Wayne
2000
2000 6 p. 8-
1 p.
article
5 Data protection for Web sites Allen, Mary
2000
2000 6 p. 5-
1 p.
article
6 Entegrity and Gradient to merge Christou, Peter
2000
2000 6 p. 4-
1 p.
article
7 Event management and analysis for Windows 2000
2000 6 p. 5-6
2 p.
article
8 ICANN — Updated Locke, Douglas
2000
2000 6 p. 16-17
2 p.
article
9 Internet security education extends to UK Henry, Katherine
2000
2000 6 p. 4-
1 p.
article
10 Irish companies need to increase security standards 2000
2000 6 p. 2-
1 p.
article
11 Latest DTI security survey highlights a corporate inability to deal with non-technical security issues — Commentary from InterClear (UK) 2000
2000 6 p. 6-
1 p.
article
12 Making Data Secure Parris, Richard
2000
2000 6 p. 10-11
2 p.
article
13 Microsoft attracts Love virus 2000
2000 6 p. 3-4
2 p.
article
14 Motorola, Ericsson and Nokia Gengler, Barbara
2000
2000 6 p. 7-
1 p.
article
15 Name change for Racal Provin, Cynthia
2000
2000 6 p. 4-
1 p.
article
16 Net surveillance plan under scrutiny Gengler, Barbara
2000
2000 6 p. 7-8
2 p.
article
17 New algorithm to protect credit cards 2000
2000 6 p. 2-3
2 p.
article
18 New system assists anti-virus developers Richardson, Karen
2000
2000 6 p. 5-
1 p.
article
19 29% of large UK companies have no firewall protection Coles, Robert
2000
2000 6 p. 1-2
2 p.
article
20 PKI bridge enables interoperability 2000
2000 6 p. 2-
1 p.
article
21 Protect your laptop against theft Burton, Terry
2000
2000 6 p. 4-5
2 p.
article
22 RC5 to support wireless clients and servers Mack, Richard
2000
2000 6 p. 3-
1 p.
article
23 Security hole in E-commerce software 2000
2000 6 p. 3-
1 p.
article
24 Techno-Crimes and Criminal Justice Systems 2000
2000 6 p. 18-19
2 p.
article
25 Vendors take care! Dwan, Berni
2000
2000 6 p. 9-
1 p.
article
26 What the InfoSec Officer Should Know About the Future of the High-Technology Crime Investigative Profession and Law Enforcement Concerns Kovacich, Gerald
2000
2000 6 p. 12-15
4 p.
article
                             26 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands