Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-3 of 3
Keywords: Networking
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Trust in Web‐based electronic commerce security
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1998) 6 (4): 162–166.
Published: 01 October 1998
... Electronic data interchange Networking Trust The two most significant areas plaguing the successful implementation of electronic commerce (EC) globally, are Internet security and transaction security. The former deals with the network, system and applications components of the electronic commerce...
Journal Articles
There’s an entranet in your future
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1997) 5 (1): 7–10.
Published: 01 March 1997
...Douglas W. Brockway Presents the concept of “entranets”, entrepreneurial partnerships enabled by computer networking. Compares the concept to the Japanese keiretsu model. Discusses the expanding role of technology in day‐to‐day business dealings. Presents case studies of successful...
Journal Articles
Protecting availability in complex computer environments
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1995) 3 (4): 20–22.
Published: 01 October 1995
... the availability of critical business applications. Together these products provide effective, integrated systems management in over 5,000 data centres in over 30 countries worldwide. Computer management Management Networking Performance management Performance measurement Systems management Candle...
