Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             24 results found
no title author magazine year volume issue page(s) type
1 A third of fraudsters remain unpunished 2000
2000 7 p. 3-4
2 p.
article
2 Automatic two-way cookie filter 2000
2000 7 p. 5-
1 p.
article
3 A warning to readers Dwan, Berni
2000
2000 7 p. 8-
1 p.
article
4 Business risk and continuity planning addressed 2000
2000 7 p. 4-
1 p.
article
5 Centrally managed solution for mobile data security 2000
2000 7 p. 5-
1 p.
article
6 Central site needed to speed fight against viruses 2000
2000 7 p. 3-
1 p.
article
7 Commitment to combating software piracy drops 10% 2000
2000 7 p. 1-2
2 p.
article
8 iD2 to roll out time-stamping technology 2000
2000 7 p. 3-
1 p.
article
9 Implementing IPsec — making security work on VPNs, intranets and extranets Dwan, Berni
2000
2000 7 p. 9-
1 p.
article
10 Information security training bridges gap 2000
2000 7 p. 4-
1 p.
article
11 Information Warfare Attacks Can Be Against Trade Secrets and Intellectual Property. How Much is a Kilo of Your Information Worth? Luzwick, Perry
2000
2000 7 p. 15-17
3 p.
article
12 Intel develops new technology Gengler, Barbara
2000
2000 7 p. 6-
1 p.
article
13 Is it Cyber-Terrorism, Techno-Terrorism, or None of the Above? 2000
2000 7 p. 18-20
3 p.
article
14 Microsoft under fire Wales, Elspeth
2000
2000 7 p. 6-7
2 p.
article
15 Microsoft upgrades Outlook’s security 2000
2000 7 p. 2-
1 p.
article
16 NSA Chief Denies Massive Eavesdropping, Industrial Espionage Madsen, Wayne
2000
2000 7 p. 13-14
2 p.
article
17 Recent viruses cause little damage 2000
2000 7 p. 2-3
2 p.
article
18 Retailers protected against fraud 2000
2000 7 p. 5-
1 p.
article
19 Secure WAP-based commerce for Taiwan 2000
2000 7 p. 3-
1 p.
article
20 Senate considers expanded computer crime role Madsen, Wayne
2000
2000 7 p. 7-
1 p.
article
21 Software You Buy or Software You Rent? Ollerenshaw, Zoe
2000
2000 7 p. 12-
1 p.
article
22 The Changing Face of International Cryptography Policy Herson, David
2000
2000 7 p. 10-11
2 p.
article
23 Web security scanner available as free download 2000
2000 7 p. 5-
1 p.
article
24 Web site launched to combat fraud 2000
2000 7 p. 4-
1 p.
article
                             24 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands