Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             38 results found
no title author magazine year volume issue page(s) type
1 Adapting Public Key Infrastructures to the Mobile Environment N T Trask
2001
19 3 p. 76-80
5 p.
article
2 Adapting Public Key Infrastructures to the Mobile Environment Trask, N T
2001
19 3 p. 76-80
article
3 Biometrics Real Identities for a Virtual World M Rejman-Greene
2001
19 3 p. 115-121
7 p.
article
4 Biometrics — Real Identities for a Virtual World Rejman-Greene, M
2001
19 3 p. 115-121
article
5 Building on Rock Rather Than Sand M Hogg
2001
19 3 p. 11-22
12 p.
article
6 Building on Rock Rather Than Sand Hogg, M
2001
19 3 p. 11-22
article
7 Concert IP Secure a Managed Firewall and VPN Service G Shorrock
2001
19 3 p. 99-106
8 p.
article
8 Concert IP Secure — a Managed Firewall and VPN Service Shorrock, G
2001
19 3 p. 99-106
article
9 Editorial John Regnault
2001
19 3 p. 2-3
2 p.
article
10 Editorial Regnault, John
2001
19 3 p. 2-3
article
11 Firewalls Evolve or Die D J Gooch
2001
19 3 p. 89-98
10 p.
article
12 Firewalls — Evolve or Die Gooch, D J
2001
19 3 p. 89-98
article
13 Foreword Chris Earnshaw
2001
19 3 p. 1-1
1 p.
article
14 Foreword Earnshaw, Chris
2001
19 3 p. 1
article
15 Information Assurance C J Colwill
2001
19 3 p. 107-114
8 p.
article
16 Information Assurance Colwill, C J
2001
19 3 p. 107-114
article
17 Interworking between SDH and OTN-Based Transport Networks A McGuire
2001
19 3 p. 143-151
9 p.
article
18 Interworking between SDH and OTN-Based Transport Networks McGuire, A
2001
19 3 p. 143-151
article
19 List of Acronyms 2001
19 3 p. 137-142
6 p.
article
20 List of Acronyms 2001
19 3 p. 137-142
article
21 Public Key Infrastructures the Next Generation K P Bosworth
2001
19 3 p. 44-59
16 p.
article
22 Public Key Infrastructures — the Next Generation Bosworth, K P
2001
19 3 p. 44-59
article
23 Recent BT Patents 2001
19 3 p. 153-153
1 p.
article
24 Recent BT Patents 2001
19 3 p. 153
article
25 Secure Digital Archiving of High-Value Data T Wright
2001
19 3 p. 60-66
7 p.
article
26 Secure Digital Archiving of High-Value Data Wright, T
2001
19 3 p. 60-66
article
27 Security Management Standard ISO 17799/BS 7799 M J Kenning
2001
19 3 p. 132-136
5 p.
article
28 Security Management Standard — ISO 17799/BS 7799 Kenning, M J
2001
19 3 p. 132-136
article
29 TETRA Security D W Parkinson
2001
19 3 p. 81-88
8 p.
article
30 TETRA Security Parkinson, D W
2001
19 3 p. 81-88
article
31 Transforming the 'Weakest Link' a Human/Computer Interaction Approach to Usable and Effective Security M A Sasse
2001
19 3 p. 122-131
10 p.
article
32 Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security Sasse, M A
2001
19 3 p. 122-131
article
33 Using XML Security Mechanisms A Selkirk
2001
19 3 p. 35-43
9 p.
article
34 Using XML Security Mechanisms Selkirk, A
2001
19 3 p. 35-43
article
35 Wireless Security C W Blanchard
2001
19 3 p. 67-75
9 p.
article
36 Wireless Security Blanchard, C W
2001
19 3 p. 67-75
article
37 XML and Security A Selkirk
2001
19 3 p. 23-34
12 p.
article
38 XML and Security Selkirk, A
2001
19 3 p. 23-34
article
                             38 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands