nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Baysecure framework's security enhanced by ACE/Server
|
|
|
1996 |
1996 |
8 |
p. 4- 1 p. |
artikel |
2 |
CryptoSystem protects TCP/IP networks
|
|
|
1996 |
1996 |
8 |
p. 4-5 2 p. |
artikel |
3 |
Enterprise Web solutions from Netscape and NeXT
|
|
|
1996 |
1996 |
8 |
p. 3- 1 p. |
artikel |
4 |
Events
|
|
|
1996 |
1996 |
8 |
p. 20- 1 p. |
artikel |
5 |
First virus capable of infecting Excel spreadsheet
|
|
|
1996 |
1996 |
8 |
p. 3- 1 p. |
artikel |
6 |
HP-UX vulnerabilities
|
|
|
1996 |
1996 |
8 |
p. 2- 1 p. |
artikel |
7 |
Internet holes — Part 12a: Internet incident response
|
Cohen, Fred |
|
1996 |
1996 |
8 |
p. 12-14 3 p. |
artikel |
8 |
Joint marketing for CyberGuard and EDS
|
|
|
1996 |
1996 |
8 |
p. 3- 1 p. |
artikel |
9 |
New NT virus scanner
|
|
|
1996 |
1996 |
8 |
p. 4- 1 p. |
artikel |
10 |
Operating system attacks from network resources
|
Hancock, Bill |
|
1996 |
1996 |
8 |
p. 8-11 4 p. |
artikel |
11 |
Providing secure, recoverable e-mail
|
Peterson, Padgett |
|
1996 |
1996 |
8 |
p. 15-19 5 p. |
artikel |
12 |
Solaris 2.5 KCMS programs vulnerability
|
|
|
1996 |
1996 |
8 |
p. 2- 1 p. |
artikel |
13 |
The Internet — Gateway to your information assets
|
David, Jon |
|
1996 |
1996 |
8 |
p. 5-7 3 p. |
artikel |
14 |
The rdist vulnerability
|
|
|
1996 |
1996 |
8 |
p. 2-3 2 p. |
artikel |
15 |
Usenet news via satellite
|
|
|
1996 |
1996 |
8 |
p. 3-4 2 p. |
artikel |