nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Briefing document for internet security
|
|
|
1996 |
1996 |
1 |
p. 6- 1 p. |
artikel |
2 |
Cable growth potential massive
|
|
|
1996 |
1996 |
1 |
p. 5- 1 p. |
artikel |
3 |
Encryption report kept under lock and key
|
|
|
1996 |
1996 |
1 |
p. 3- 1 p. |
artikel |
4 |
Events
|
|
|
1996 |
1996 |
1 |
p. 20- 1 p. |
artikel |
5 |
Further online banking competition
|
|
|
1996 |
1996 |
1 |
p. 4- 1 p. |
artikel |
6 |
Growth in UK cell-phone fraud
|
|
|
1996 |
1996 |
1 |
p. 2-3 2 p. |
artikel |
7 |
Hackers for hire
|
Lindup, Ken |
|
1996 |
1996 |
1 |
p. 18- 1 p. |
artikel |
8 |
Internal security across client/server networks
|
|
|
1996 |
1996 |
1 |
p. 6- 1 p. |
artikel |
9 |
Internet holes — Part 5b: 50 ways to attack your Web systems
|
Cohen, Fred |
|
1996 |
1996 |
1 |
p. 9-13 5 p. |
artikel |
10 |
Lotus working on military version of Notes
|
English, Erin |
|
1996 |
1996 |
1 |
p. 8- 1 p. |
artikel |
11 |
McAfee gives the boot to virus
|
Kaneshige, Thomas |
|
1996 |
1996 |
1 |
p. 7- 1 p. |
artikel |
12 |
NetConnect distributes BorderWare firewall
|
|
|
1996 |
1996 |
1 |
p. 3-4 2 p. |
artikel |
13 |
Network security assessment tool for Windows NT
|
|
|
1996 |
1996 |
1 |
p. 7- 1 p. |
artikel |
14 |
Network security made easy with little black box
|
Kaneshige, Thomas |
|
1996 |
1996 |
1 |
p. 7-8 2 p. |
artikel |
15 |
Novell's operating systems forecast to remain dominant
|
|
|
1996 |
1996 |
1 |
p. 4- 1 p. |
artikel |
16 |
Oracle to secure database access over the Net
|
Kaneshige, Thomas |
|
1996 |
1996 |
1 |
p. 9- 1 p. |
artikel |
17 |
Public-key encryption flawed in time
|
|
|
1996 |
1996 |
1 |
p. 3- 1 p. |
artikel |
18 |
rpc.ypupdated vulnerability
|
|
|
1996 |
1996 |
1 |
p. 2- 1 p. |
artikel |
19 |
SEC tackles Internet investment fraud
|
English, Erin |
|
1996 |
1996 |
1 |
p. 8- 1 p. |
artikel |
20 |
Secure domain unit for network protection
|
|
|
1996 |
1996 |
1 |
p. 5-6 2 p. |
artikel |
21 |
Spec for secure transactions
|
|
|
1996 |
1996 |
1 |
p. 5- 1 p. |
artikel |
22 |
The impact of ATM on security in the data network
|
Hanson, Lesley |
|
1996 |
1996 |
1 |
p. 13-17 5 p. |
artikel |
23 |
The new era of cable modems
|
|
|
1996 |
1996 |
1 |
p. 4-5 2 p. |
artikel |
24 |
Users demand encryption policies
|
|
|
1996 |
1996 |
1 |
p. 5- 1 p. |
artikel |