nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Aventail divests services business
|
|
|
2005 |
2 |
2 |
p. 5- 1 p. |
artikel |
2 |
CA vulnerabilities re-spark disclosure debate
|
Everett, Cath |
|
2005 |
2 |
2 |
p. 8- 1 p. |
artikel |
3 |
Chinese crack open crypto world
|
Hilley, Sarah |
|
2005 |
2 |
2 |
p. 10- 1 p. |
artikel |
4 |
Choicepoint: sued, defrauded and share price quartered
|
Hilley, Sarah |
|
2005 |
2 |
2 |
p. 4- 1 p. |
artikel |
5 |
Close shave for Japanese bank
|
McKenna, Brian |
|
2005 |
2 |
2 |
p. 4- 1 p. |
artikel |
6 |
Compliance concentrates the mind
|
|
|
2005 |
2 |
2 |
p. 26-32 7 p. |
artikel |
7 |
Cyberstalking in the urban jungle
|
Mathieson, SA |
|
2005 |
2 |
2 |
p. 34-36 3 p. |
artikel |
8 |
Embracing risk
|
Berlich, Peter |
|
2005 |
2 |
2 |
p. 52-53 2 p. |
artikel |
9 |
Fight hidden persuaders with fine filters
|
Joepen, Horst |
|
2005 |
2 |
2 |
p. 49-50 2 p. |
artikel |
10 |
Firewalls ring changes
|
Knight, William |
|
2005 |
2 |
2 |
p. 18-21 4 p. |
artikel |
11 |
Healthcare security needs a social solution
|
Grant, Ian |
|
2005 |
2 |
2 |
p. 12- 1 p. |
artikel |
12 |
How to spam
|
Pfleeger, Charles P |
|
2005 |
2 |
2 |
p. 55- 1 p. |
artikel |
13 |
If you don't know who goes there, you could be jail-bound
|
Burling, Michael |
|
2005 |
2 |
2 |
p. 50-51 2 p. |
artikel |
14 |
Industry calendar
|
|
|
2005 |
2 |
2 |
p. 56- 1 p. |
artikel |
15 |
Juniper adds wireless to its 5GT family
|
|
|
2005 |
2 |
2 |
p. 6- 1 p. |
artikel |
16 |
Mid-Atlantic security
|
Mathieson, SA |
|
2005 |
2 |
2 |
p. 22-23 2 p. |
artikel |
17 |
News in brief
|
|
|
2005 |
2 |
2 |
p. 4-6 3 p. |
artikel |
18 |
Securing what makes the world spin around
|
Dudley-Gough, Nova |
|
2005 |
2 |
2 |
p. 45-46 2 p. |
artikel |
19 |
Security — built-in or bolted-on to the SOA?
|
Knight, William |
|
2005 |
2 |
2 |
p. 38-40 3 p. |
artikel |
20 |
Self-defending network puts Cisco on attack
|
Everett, Cath |
|
2005 |
2 |
2 |
p. 42-44 3 p. |
artikel |
21 |
Slack Space
|
Hilley, Sarah |
|
2005 |
2 |
2 |
p. 54- 1 p. |
artikel |
22 |
Stalkers and systems
|
McKenna, Brian |
|
2005 |
2 |
2 |
p. 3- 1 p. |
artikel |
23 |
The four ages of malware
|
Thompson, Roger |
|
2005 |
2 |
2 |
p. 47-48 2 p. |
artikel |
24 |
Windows XP SP2- the cull of the bots
|
Hilley, Sarah |
|
2005 |
2 |
2 |
p. 4- 1 p. |
artikel |