Publisher: Emerald Group Publishing Limited

Related content
Volume 7, Number 2, 1999

< previous issue | all issues | next issue >

Favourites:Add to Favourites

Dissecting the "Hacker Manifesto"
pp. 69-75(7)
Authors: Furnell, S.M.; Dowland, P.S.; Sanders, P.W.

Favourites:Add to Favourites

An introduction to automated intrusion detection approaches
pp. 76-82(7)
Authors: Hart, Rod; Morgan, Darren; Tran, Hai

Favourites:Add to Favourites

Digital signatures and the future of documentation
pp. 83-87(5)
Author: Wilson, Stephen

Favourites:Add to Favourites

The evolution of certificate model architecture
pp. 95-100(6)
Authors: Liddy, Carrie; Sturgeon, Alice

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more