Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 7, Number 2, 1999

Dissecting the "Hacker Manifesto"
pp. 69-75(7)
Authors: Furnell, S.M.; Dowland, P.S.; Sanders, P.W.

Favourites:
ADD

An introduction to automated intrusion detection approaches
pp. 76-82(7)
Authors: Hart, Rod; Morgan, Darren; Tran, Hai

Favourites:
ADD

Digital signatures and the future of documentation
pp. 83-87(5)
Author: Wilson, Stephen

Favourites:
ADD

The evolution of certificate model architecture
pp. 95-100(6)
Authors: Liddy, Carrie; Sturgeon, Alice

Favourites:
ADD

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Partial Open Access Content
Partial Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more