nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Aping to defraud – corporate identities at stake
|
James, Mick |
|
2006 |
|
3 |
p. 24-26 3 p. |
artikel |
2 |
A return to traditional methods
|
King, Stuart |
|
2006 |
|
3 |
p. 40- 1 p. |
artikel |
3 |
Australian computer crime changes tack
|
Grant, Ian |
|
2006 |
|
3 |
p. 6- 1 p. |
artikel |
4 |
Aventail tunnels for more business
|
Knight, William |
|
2005 |
|
3 |
p. 4- 1 p. |
artikel |
5 |
Banking on digital ceritificates to prevent UK payment fraud
|
Arnfield, Robin |
|
2004 |
|
3 |
p. 16-18 3 p. |
artikel |
6 |
Basket cases
|
Jones, Bob |
|
2004 |
|
3 |
p. 36- 1 p. |
artikel |
7 |
Bug-fixed applications still insecure
|
McKenna, Brian |
|
2004 |
|
3 |
p. 6- 1 p. |
artikel |
8 |
CA launches co-managed VA and patch management service
|
McKenna, Brian |
|
2004 |
|
3 |
p. 5- 1 p. |
artikel |
9 |
Cisco and Trend Micro tighten collaboration around Sasser-like attacks
|
McKenna, Brian |
|
2004 |
|
3 |
p. 4- 1 p. |
artikel |
10 |
Cisco unveils integrated security appliance family
|
McKenna, Brian |
|
2005 |
|
3 |
p. 4- 1 p. |
artikel |
11 |
Cover story: up the ante on IP
|
Mathieson, SA |
|
2004 |
|
3 |
p. 20-22 3 p. |
artikel |
12 |
Crypto goes into the bloodstream
|
Murton, Daniel |
|
2006 |
|
3 |
p. 42- 1 p. |
artikel |
13 |
Cyber attacks on banks double from 2003
|
McKenna, Brian |
|
2004 |
|
3 |
p. 5- 1 p. |
artikel |
14 |
Dark age at drug firms
|
Bradbury, Danny |
|
2004 |
|
3 |
p. 32-34 3 p. |
artikel |
15 |
Data regulation — what do you need to know?
|
Wilkinson, Tim |
|
2005 |
|
3 |
p. 46- 1 p. |
artikel |
16 |
Disclosure — time to ask the users
|
Doyle, Eric |
|
2005 |
|
3 |
p. 5- 1 p. |
artikel |
17 |
Don't make networks smart, keep them dumb and make them fast
|
Kaplan, Evan |
|
2005 |
|
3 |
p. 40-41 2 p. |
artikel |
18 |
Ecrime at Infosecurity Europe 2006
|
Mathieson, SA |
|
2006 |
|
3 |
p. 8- 1 p. |
artikel |
19 |
Effective policy
|
Pfleeger, Charles P. |
|
2005 |
|
3 |
p. 47- 1 p. |
artikel |
20 |
E-government security
|
Stibbe, Matthew |
|
2005 |
|
3 |
p. 8-10 3 p. |
artikel |
21 |
Empire and Federation differ in security style
|
Krempl, Stefan |
|
2006 |
|
3 |
p. 16-18 3 p. |
artikel |
22 |
Finger(print) of fate
|
O'Halloran, Joe |
|
2004 |
|
3 |
p. 8- 1 p. |
artikel |
23 |
First major Chip and PIN fraud hits Shell
|
Hilley, Sarah |
|
2006 |
|
3 |
p. 4- 1 p. |
artikel |
24 |
Get the picture?
|
Mathieson, SA |
|
2005 |
|
3 |
p. 11-14 4 p. |
artikel |
25 |
Hampshire police smart with cards
|
Hilley, Sarah |
|
2005 |
|
3 |
p. 4- 1 p. |
artikel |
26 |
Hijacks on the information Highway
|
Moynihan, Niall |
|
2004 |
|
3 |
p. 44- 1 p. |
artikel |
27 |
HP exploits new bugs to fix its systems
|
Hilley, Sarah |
|
2004 |
|
3 |
p. 6- 1 p. |
artikel |
28 |
Industry calendar
|
|
|
2006 |
|
3 |
p. 48- 1 p. |
artikel |
29 |
Industry calendar
|
|
|
2004 |
|
3 |
p. 48- 1 p. |
artikel |
30 |
Industry calendar
|
|
|
2005 |
|
3 |
p. 48- 1 p. |
artikel |
31 |
Industry matures at Infosecurity Europe
|
McIlwraith, Angus |
|
2006 |
|
3 |
p. 38- 1 p. |
artikel |
32 |
Infosecurity Europe marks a decade
|
McKenna, Brian |
|
2005 |
|
3 |
p. 33-34 2 p. |
artikel |
33 |
Keeping IT healthy
|
Dudley-Gough, Nova |
|
2005 |
|
3 |
p. 6- 1 p. |
artikel |
34 |
Let's get physical
|
McKenna, Brian |
|
2005 |
|
3 |
p. 3- 1 p. |
artikel |
35 |
Liberal heart of the EU
|
Grant, Ian |
|
2005 |
|
3 |
p. 30-32 3 p. |
artikel |
36 |
Lost highway
|
Munro, Ken |
|
2006 |
|
3 |
p. 39- 1 p. |
artikel |
37 |
Managing mobile
|
Pritchard, Stephen |
|
2006 |
|
3 |
p. 28-30 3 p. |
artikel |
38 |
McKinnon extradition no risk to pen testers
|
Mathieson, SA |
|
2006 |
|
3 |
p. 4- 1 p. |
artikel |
39 |
Open on all sides, he cannot be attacked
|
Tomlinson, Gary |
|
2004 |
|
3 |
p. 42-43 2 p. |
artikel |
40 |
Privateer repels boarders
|
Everett, Cath |
|
2004 |
|
3 |
p. 24-26 3 p. |
artikel |
41 |
Product roundup
|
|
|
2006 |
|
3 |
p. 43-46 4 p. |
artikel |
42 |
Racist spam on eve of EU elections
|
McKenna, Brian |
|
2004 |
|
3 |
p. 4- 1 p. |
artikel |
43 |
Red tape binds virtual, physical security
|
Everett, Cath |
|
2005 |
|
3 |
p. 22-24 3 p. |
artikel |
44 |
RFID – another technology, another security mess?
|
Knight, William |
|
2006 |
|
3 |
p. 35-37 3 p. |
artikel |
45 |
Rich broth may spoil
|
O'Halloran, Joe |
|
2004 |
|
3 |
p. 10- 1 p. |
artikel |
46 |
RSA over SecurID?
|
Everett, Cath |
|
2005 |
|
3 |
p. 37-39 3 p. |
artikel |
47 |
Secure coding — principles and practices
|
Blyth, Andrew |
|
2004 |
|
3 |
p. 46- 1 p. |
artikel |
48 |
Securing mobile workers
|
Garlick, Nick |
|
2005 |
|
3 |
p. 45- 1 p. |
artikel |
49 |
Security managers getting act together?
|
Hilley, Sarah |
|
2004 |
|
3 |
p. 4- 1 p. |
artikel |
50 |
Slack space
|
|
|
2006 |
|
3 |
p. 47- 1 p. |
artikel |
51 |
Smart cards face long wait
|
Everett, Cath |
|
2006 |
|
3 |
p. 22-23 2 p. |
artikel |
52 |
Smart IP protection
|
McKenna, Brian |
|
2004 |
|
3 |
p. 1- 1 p. |
artikel |
53 |
Social engineering
|
Munro, Ken |
|
2005 |
|
3 |
p. 44- 1 p. |
artikel |
54 |
Storming London – Infosecurity Europe 2004
|
McKenna, Brian |
|
2004 |
|
3 |
p. 12-15 4 p. |
artikel |
55 |
Telecoms – convergence challenge
|
Grant, Ian |
|
2006 |
|
3 |
p. 19-21 3 p. |
artikel |
56 |
The Big Con
|
Mathieson, SA |
|
2006 |
|
3 |
p. 12-14 3 p. |
artikel |
57 |
The ‘big con’ for the information age
|
McKenna, Brian |
|
2006 |
|
3 |
p. 3- 1 p. |
artikel |
58 |
The broader view
|
Hilley, Sarah |
|
2005 |
|
3 |
p. 35-36 2 p. |
artikel |
59 |
The convergence of physical security and IT
|
Giles, Tim |
|
2005 |
|
3 |
p. 42- 1 p. |
artikel |
60 |
The law starts to bite back
|
Jones, Andy |
|
2006 |
|
3 |
p. 41- 1 p. |
artikel |
61 |
The money's at the margins
|
Baker, Wade |
|
2006 |
|
3 |
p. 10-11 2 p. |
artikel |
62 |
The physics of information security
|
McKenna, Brian |
|
2004 |
|
3 |
p. 28-30 3 p. |
artikel |
63 |
The Pru gets smart with spam
|
|
|
2004 |
|
3 |
p. 6- 1 p. |
artikel |
64 |
The rocky road to reliable software
|
Grant, Ian |
|
2004 |
|
3 |
p. 38-41 4 p. |
artikel |
65 |
The VoIP security imperative
|
Gold, Steve |
|
2005 |
|
3 |
p. 26-28 3 p. |
artikel |
66 |
Tick all the boxes
|
Bradbury, Danny |
|
2005 |
|
3 |
p. 20-21 2 p. |
artikel |
67 |
VPN boom bewilders users
|
Knight, William |
|
2005 |
|
3 |
p. 15-19 5 p. |
artikel |
68 |
Webroot spies enterprise growth
|
Everett, Cath |
|
2006 |
|
3 |
p. 32-34 3 p. |
artikel |
69 |
When you outsource to India, where does your data go? Not where you think…
|
Hilley, Sarah |
|
2004 |
|
3 |
p. 6- 1 p. |
artikel |
70 |
Zero Day is now
|
Nagy, Ben |
|
2005 |
|
3 |
p. 43- 1 p. |
artikel |