Cochrane, 1997 - Google Patents
The power within [Internet]Cochrane, 1997
- Document ID
- 14911868228585234609
- Author
- Cochrane R
- Publication year
- Publication venue
- IEE Review
External Links
Snippet
The public Internet has revolutionised the world's communications. Now companies are rushing to build their own private intranets. The author explains some of the attractions that intranets provide: cross-platform functionality; a consistent view of information; an enabling …
- 238000009434 installation 0 abstract 1
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9860251B2 (en) | Dynamic encryption of a universal resource locator | |
US7680819B1 (en) | Managing digital identity information | |
US6128645A (en) | Hyper and client domain servers | |
JP2001527716A (en) | Client-side communication server device and method | |
WO2011068796A2 (en) | Policy directed security-centric model driven architecture to secure client and cloud hosted web service enabled processes | |
Marshall et al. | Use of a secure Internet Web site for collaborative medical research | |
Elmurzayevich | Cloud technology to ensure the protection of fundamental methods and use of information | |
Gritzalis | Embedding privacy in IT applications development | |
Zhao | WebEntree: A Web service aggregator | |
Casselberry et al. | Running a perfect intranet | |
Cochrane | The power within [Internet] | |
Glenn et al. | Access management of web-based services | |
Lewontin | The DCE Web Toolkit: enhancing WWW protocols with lower-layer services | |
Pescatore | Secure use of the World Wide Web: keeping browsers and servers from getting snared | |
Graham | Putting privacy in context—an overview of the concept of privacy and of current technologies | |
Karar | Intranet Design For Tactical Purposes | |
Cochrane | Unleashing the intranet | |
Striletchi et al. | Enhancing the security of web applications | |
Yen et al. | Extranet: current developments and future analyses | |
Murray | Library web proxy use survey results | |
Wang et al. | Electronic Commerce Items and Related Technology | |
Cohen | Internet holes—Part 5a: 50 ways to attack your web systems | |
Balcı | Web Based User Accounting System for Internet Service Providers | |
Gamvroulas et al. | A secure brokerage network for retail banking services | |
Lang | CORBA security on the web–an overview |