Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 7, Number 2, 1999

Dissecting the "Hacker Manifesto"
pp. 69-75(7)
Authors: Furnell, S.M.; Dowland, P.S.; Sanders, P.W.

Favourites:
ADD

An introduction to automated intrusion detection approaches
pp. 76-82(7)
Authors: Hart, Rod; Morgan, Darren; Tran, Hai

Favourites:
ADD

Digital signatures and the future of documentation
pp. 83-87(5)
Author: Wilson, Stephen

Favourites:
ADD

The evolution of certificate model architecture
pp. 95-100(6)
Authors: Liddy, Carrie; Sturgeon, Alice

Favourites:
ADD

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more