Abstracts of Recent Articles and Literature (English)
- New search for: Nichol, S.
- New search for: Nichol, S.
In:
COMPUTERS AND SECURITY
;
18
, 4
;
335-340
;
1999
-
ISSN:
- Article (Journal) / Print
-
Title:Abstracts of Recent Articles and Literature
-
Contributors:Nichol, S. ( author )
-
Published in:COMPUTERS AND SECURITY ; 18, 4 ; 335-340
-
Publisher:
- New search for: ELSEVIER
-
Publication date:1999-01-01
-
Size:6 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 005.8
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 005.8 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 18, Issue 4
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 276
-
From the Editor| 1999
- 278
-
Security ViewsHancock, Bill et al. | 1999
- 278
-
Security Views - Appeals-Court Panel Says Export Ban On Encryption Software Is Unlawful| 1999
- 279
-
Security Views - EU Bill Holds ISPs Liable for Web Content| 1999
- 279
-
Security Views - Hackers Attack US Government Web Sites on Protest of Chinese Embassy Bombing| 1999
- 280
-
Security Views - FTC Accuses Young Investor Site of Privacy Violations, but What's a Webmaster to do? Call Mom and Dad on Each Page Access?| 1999
- 282
-
Security Views - Being All That You Can Virtually Be -- Cyberwar Education Gets Formal| 1999
- 282
-
Security Views - New Internet Legislation Attempts in the US| 1999
- 283
-
Security Views - Theft of Information in the Workplace Creates Growing Concern for Corporate America| 1999
- 284
-
Security Views - 45% of Big Firms Monitor Workers| 1999
- 284
-
Security Views - US Releases New Data Privacy Guidelines| 1999
- 285
-
Security Views - Experts: Use Caution With White-Hat Hackers| 1999
- 285
-
Security Views - Microsoft to Offer Privacy Tools| 1999
- 286
-
Security Views - UK Report Blows Government Security Sky High| 1999
- 287
-
Security Views - Risks to Security Growing as Fast as Numbers of Systems| 1999
- 288
-
Security Views - US Nuclear Labs Find Counterespionage Difficult| 1999
- 288
-
Security Views - Internet Users Furious Over Sing Tel's Computer Security Probe| 1999
- 289
-
Security Views - VPNs Build Momentum| 1999
- 291
-
Security Views - Parents Seek Blocks for Web Sites| 1999
- 292
-
Security Views - Information Society in the EU: Digital Signatures| 1999
- 293
-
Security Views - Clinton Proposes Privacy Controls| 1999
- 295
-
Special Features - E for Exponential GrowthHinde, Stephen et al. | 1999
- 295
-
E for Exponential GrowthHinde, S. et al. | 1999
- 300
-
No Surprises in Melissa LandFord, R. et al. | 1999
- 300
-
Special Features - No Surprises, in Mellissa LandFord, Richard et al. | 1999
- 303
-
Special Features - Employers and the Internet: Legal Woes and ConcernsBequai, August et al. | 1999
- 303
-
Employers and the Internet: Legal Woes and ConcernsBequai, A. et al. | 1999
- 307
-
Special Features - The Revised Version of BS7799 -- So What's New?Pounder, Chris et al. | 1999
- 307
-
The Revised Version of BS7799 -- So What's New?Pounder, C. et al. | 1999
- 312
-
Encryption -- Do or Die For UK BusinessBulmer, G. et al. | 1999
- 312
-
Special Features - Encryption -- Do or Die for UK BusinessBulmer, Garry et al. | 1999
- 317
-
Implicit Trust in the Risk Assessment Process of EDIRatnasingham, P. et al. | 1999
- 317
-
Special Features - Implicit Trust in the Risk Assessment Process of EDIRatnasingham, Pauline et al. | 1999
- 322
-
Computer Security -- What Should You Spend Your Money On?Buzzard, K. et al. | 1999
- 322
-
Special Features - Computer Security -- What Should You Spend Your Money On?Buzzard, Keith et al. | 1999
- 335
-
Abstracts of Recent Articles and LiteratureNichol, S. et al. | 1999
- 335
-
Current Literature - Abstracts of recent articles and literature| 1999
- 341
-
Events - Calendar of forthcoming conferences and events| 1999
- 343
-
Refereed Papers - International Board of Referees| 1999
- 345
-
Hash-Based Encryption SystemPeyravian, M. / Roginsky, A. / Zunic, N. et al. | 1999
- 345
-
Refereed Papers - Hash-Based Encryption SystemsPeyravian, Mohammad et al. | 1999
- 351
-
Refereed Papers - Policy GroupsKühnhauser, Winfried et al. | 1999
- 351
-
Policy GroupsKuhnhauser, W.E. et al. | 1999
- 365
-
IFIP Technical Committee 11| 1999
- 368
-
Guide to Authors| 1999