Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 10, Number 3, 2002

An experimental comparison of secret-based user authentication technologies
pp. 100-108(9)
Authors: Irakleous, I.; Furnell, S.M.; Dowland, P.S.; Papadaki, M.

Favourites:
ADD

Information management of automatic data capture: an overview of technical developments
pp. 109-118(10)
Authors: Smith, Alan D.; Offodile, Felix

Favourites:
ADD

The information security management toolbox – taking the pain out of security management
pp. 119-125(7)
Authors: Vermeulen, Clive; Von Solms, Rossouw

Favourites:
ADD
Favourites:
ADD

System insecurity – firewalls
pp. 135-139(5)
Authors: Desai, Mayur S.; Richards, Thomas C.; von der Embse, Thomas

Favourites:
ADD

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more