Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             19 results found
no title author magazine year volume issue page(s) type
1 AirSnort Tool Cracks WEP in 15 Minutes 2001
2001 9 p. 5-
1 p.
article
2 Code Blue worse than Code Red? 2001
2001 9 p. 4-
1 p.
article
3 DMCA silences Intel crypto researcher 2001
2001 9 p. 1-
1 p.
article
4 Dmitry update: the $2 million crypto geek 2001
2001 9 p. 2-
1 p.
article
5 Events Calendar 2001
2001 9 p. 20-
1 p.
article
6 High-end IT Security: No Longer a Distant Pipe Dream for SMEs Robinson, Fiona
2001
2001 9 p. 12-14
3 p.
article
7 Hotmail security has serious flaw 2001
2001 9 p. 2-3
2 p.
article
8 If Information Warfare Attacks are a Concern, Then Evaluate the Security Policy Luzwick, Perry
2001
2001 9 p. 16-18
3 p.
article
9 If You are an InfoSec Professional, You Must Also Be An InfoSec Writer — Part II 2001
2001 9 p. 18-20
3 p.
article
10 Judges rebel against usage monitoring 2001
2001 9 p. 3-
1 p.
article
11 Labor day virus is damp squib 2001
2001 9 p. 4-
1 p.
article
12 New era in hacktivism? 2001
2001 9 p. 4-
1 p.
article
13 Passwords: Use and Abuse Yapp, Peter
2001
2001 9 p. 14-16
3 p.
article
14 Report a bug, go to jail? 2001
2001 9 p. 3-
1 p.
article
15 Something New, Something Old Dwan, Berni
2001
2001 9 p. 7-
1 p.
article
16 The Changing Face of International Cryptography Policy Herson, David
2001
2001 9 p. 8-9
2 p.
article
17 The Draft Executive Order On Cyber-security Explained Madsen, US Correspondent, Wayne
2001
2001 9 p. 5-6
2 p.
article
18 This is Your Life Henry, Katherine
2001
2001 9 p. 10-11
2 p.
article
19 Voice copying program sparks fears over ID theft 2001
2001 9 p. 3-4
2 p.
article
                             19 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands