Network Security archive最新文献

筛选
英文 中文
Electronic news: UK E-Commerce bill - summary 电子新闻:英国电子商务法案-摘要
Network Security archive Pub Date : 1999-05-01 DOI: 10.1016/S1353-4858(99)90291-X
N. Miller
{"title":"Electronic news: UK E-Commerce bill - summary","authors":"N. Miller","doi":"10.1016/S1353-4858(99)90291-X","DOIUrl":"https://doi.org/10.1016/S1353-4858(99)90291-X","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126899740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electronic news: Liability for infringements on linked sites? 电子新闻:链接网站侵权的责任?
Network Security archive Pub Date : 1999-05-01 DOI: 10.1016/S1353-4858(99)90292-1
N. Miller
{"title":"Electronic news: Liability for infringements on linked sites?","authors":"N. Miller","doi":"10.1016/S1353-4858(99)90292-1","DOIUrl":"https://doi.org/10.1016/S1353-4858(99)90292-1","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126424958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Report: Encryption standard replaced 报告:加密标准被替换
Network Security archive Pub Date : 1998-09-01 DOI: 10.1016/S1353-4858(98)80013-5
Barbara Gengler
{"title":"Report: Encryption standard replaced","authors":"Barbara Gengler","doi":"10.1016/S1353-4858(98)80013-5","DOIUrl":"https://doi.org/10.1016/S1353-4858(98)80013-5","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature: Using network hacking techniques to disrupt military operational networks 特点:利用网络黑客技术破坏军事作战网络
Network Security archive Pub Date : 1998-08-01 DOI: 10.1016/S1353-4858(98)80075-5
B. Hancock
{"title":"Feature: Using network hacking techniques to disrupt military operational networks","authors":"B. Hancock","doi":"10.1016/S1353-4858(98)80075-5","DOIUrl":"https://doi.org/10.1016/S1353-4858(98)80075-5","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"119917945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Report: NetScreen plays in firewall arena 报告:NetScreen在防火墙领域发挥作用
Network Security archive Pub Date : 1998-06-01 DOI: 10.1016/S1353-4858(98)90009-5
Barbara Gengler
{"title":"Report: NetScreen plays in firewall arena","authors":"Barbara Gengler","doi":"10.1016/S1353-4858(98)90009-5","DOIUrl":"https://doi.org/10.1016/S1353-4858(98)90009-5","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120627692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Report: War against spam 报告:向垃圾邮件宣战
Network Security archive Pub Date : 1997-12-01 DOI: 10.1016/S1353-4858(97)88550-9
E. Wehde
{"title":"Report: War against spam","authors":"E. Wehde","doi":"10.1016/S1353-4858(97)88550-9","DOIUrl":"https://doi.org/10.1016/S1353-4858(97)88550-9","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127123800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature: A comparison between Java and ActiveX security 特性:比较了Java和ActiveX的安全性
Network Security archive Pub Date : 1997-12-01 DOI: 10.1016/S1353-4858(97)88552-2
David Hopwood
{"title":"Feature: A comparison between Java and ActiveX security","authors":"David Hopwood","doi":"10.1016/S1353-4858(97)88552-2","DOIUrl":"https://doi.org/10.1016/S1353-4858(97)88552-2","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128547432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Report: Distributing encrypted messages more securely 报告:更安全地分发加密消息
Network Security archive Pub Date : 1997-09-01 DOI: 10.1016/S1353-4858(97)80253-X
Charlie Breitrose
{"title":"Report: Distributing encrypted messages more securely","authors":"Charlie Breitrose","doi":"10.1016/S1353-4858(97)80253-X","DOIUrl":"https://doi.org/10.1016/S1353-4858(97)80253-X","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117735556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature: The end of the virus problem 特征:病毒问题的结束
Network Security archive Pub Date : 1996-07-01 DOI: 10.1016/1353-4858(96)83739-1
A. Solomon
{"title":"Feature: The end of the virus problem","authors":"A. Solomon","doi":"10.1016/1353-4858(96)83739-1","DOIUrl":"https://doi.org/10.1016/1353-4858(96)83739-1","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127629985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Feature: Superman is alive and well and living in wapping 特点:超人活得很好,而且活得很好
Network Security archive Pub Date : 1996-07-01 DOI: 10.1016/1353-4858(96)83740-8
Ken Lindup
{"title":"Feature: Superman is alive and well and living in wapping","authors":"Ken Lindup","doi":"10.1016/1353-4858(96)83740-8","DOIUrl":"https://doi.org/10.1016/1353-4858(96)83740-8","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120295405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信