nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Barclays' pilot for electronic commerce
|
|
|
1996 |
1996 |
7 |
p. 5- 1 p. |
artikel |
2 |
Businesses get help to beat Internet crime
|
|
|
1996 |
1996 |
7 |
p. 4- 1 p. |
artikel |
3 |
CKS MyNet, the answer to single sign-on?
|
|
|
1996 |
1996 |
7 |
p. 7- 1 p. |
artikel |
4 |
Companies adopt Internet commerce solutions
|
|
|
1996 |
1996 |
7 |
p. 4- 1 p. |
artikel |
5 |
Credit-card company seeks strong encryption
|
|
|
1996 |
1996 |
7 |
p. 5- 1 p. |
artikel |
6 |
Events
|
|
|
1996 |
1996 |
7 |
p. 20- 1 p. |
artikel |
7 |
Internet holes — Part 11: Internet lightning rods
|
Cohen, Fred |
|
1996 |
1996 |
7 |
p. 9-13 5 p. |
artikel |
8 |
IronBridge and IronWall
|
|
|
1996 |
1996 |
7 |
p. 6-7 2 p. |
artikel |
9 |
Librarians develop Internet protocol
|
|
|
1996 |
1996 |
7 |
p. 5-6 2 p. |
artikel |
10 |
McAfee and Microsoft clean up Internet
|
Kaneshige, Thomas |
|
1996 |
1996 |
7 |
p. 9- 1 p. |
artikel |
11 |
Revisions in SET mark advances to secure Cyberspace shopping
|
Savarnejad, Atoosa |
|
1996 |
1996 |
7 |
p. 8- 1 p. |
artikel |
12 |
Right mouse click could allow in viruses
|
|
|
1996 |
1996 |
7 |
p. 3- 1 p. |
artikel |
13 |
Secure Virtual Private Networks
|
|
|
1996 |
1996 |
7 |
p. 6- 1 p. |
artikel |
14 |
Security and authentication offered
|
|
|
1996 |
1996 |
7 |
p. 3-4 2 p. |
artikel |
15 |
Security framework from Microsoft
|
Sterlicchi, John |
|
1996 |
1996 |
7 |
p. 7-8 2 p. |
artikel |
16 |
Serverware launches new version of SeNTry
|
|
|
1996 |
1996 |
7 |
p. 6- 1 p. |
artikel |
17 |
Suidperl vulnerability
|
|
|
1996 |
1996 |
7 |
p. 2-3 2 p. |
artikel |
18 |
Superman is alive and well and living in wapping
|
Lindup, Ken |
|
1996 |
1996 |
7 |
p. 18- 1 p. |
artikel |
19 |
The end of the virus problem
|
Solomon, Alan |
|
1996 |
1996 |
7 |
p. 13-17 5 p. |
artikel |
20 |
Total secure networking solutions incorporates CyberGuard
|
|
|
1996 |
1996 |
7 |
p. 4-5 2 p. |
artikel |
21 |
Vulnerability in DEC software security kits
|
|
|
1996 |
1996 |
7 |
p. 2- 1 p. |
artikel |
22 |
Vulnerability in the dip program
|
|
|
1996 |
1996 |
7 |
p. 2- 1 p. |
artikel |