Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 Achilles' Heel: IM, PDA & Wireless77 2005
2005 10 p. 1-
1 p.
article
2 BACSTEL-IP - one of the biggest PKI projects ever Meadowcroft, Paul
2005
2005 10 p. 10-12
3 p.
article
3 Cheap, simple ways to beat remote transaction fraud 2005
2005 10 p. 1-
1 p.
article
4 Credit card companies can keep tight lipped on hacker victims, rules judge 2005
2005 10 p. 2-3
2 p.
article
5 Digital rights management and trusted computing 2005
2005 10 p. 20-
1 p.
article
6 Events calendar 2005
2005 10 p. 20-
1 p.
article
7 Exit old fashioned phishing – enter hardcore Trojans and moles 2005
2005 10 p. 2-
1 p.
article
8 In brief 2005
2005 10 p. 3-
1 p.
article
9 Low-cost assurance for B2C E-commerce Walton, Richard
2005
2005 10 p. 4-6
3 p.
article
10 Malware chases the money 2005
2005 10 p. 3-
1 p.
article
11 Protecting your crown jewels: an introduction to embedded security for hardware-based products Grand, Joe
2005
2005 10 p. 13-20
8 p.
article
12 Wireless, PDA and Instant Messaging: Achilles' Heel? Power, Richard
2005
2005 10 p. 7-9
3 p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands