Encryption: Difference between revisions
Jump to navigation
Jump to search
(→Links) |
|||
Line 3: | Line 3: | ||
Under Construction | Under Construction | ||
= Links = | |||
These will be sorted later on. | These will be sorted later on. |
Revision as of 01:01, 31 July 2008
Study Guide
Under Construction
Links
These will be sorted later on.
- http://ezinearticles.com/?Ethical-Considerations-of-Privacy-and-Cyber-Medical-Information&id=1077289
- http://www.nysscpa.org/cpajournal/2008/508/essentials/p62.htm
- http://searchsecurity.techtarget.com/news/column/0,294698,sid14_gci1238490,00.html
- http://securityblog.typepad.com/technology_security/2007/06/government_buys.html
- http://blogs.computerworld.com/federal_encryption_standardization
- http://www.dslreports.com/shownews/Your-Encryption-Key-a-Fifth-Amendment-Right-90282
- http://www.wired.com/news/technology/0,70524-0.html?tw=wn_index_1
- http://www.nytimes.com/2006/05/22/technology/22privacy.html
- http://www.usatoday.com/money/industries/technology/2006-02-16-skype-wiretap
- http://www.technewsworld.com/story/60102.html
- http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/07/12/19/Unlocking-encryption-management_1.html