nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Half-Dozen Rules for Securing Your Web Application
|
Forsythe, Charles |
|
1998 |
|
3 |
p. 9-12 |
artikel |
2 |
A Multilevel Strategy for Combatting Viruses
|
Piazza, Joseph |
|
1994 |
|
3 |
p. 45-52 |
artikel |
3 |
Anonymity, Privacy, and Trust
|
Poore, Ralph Spencer |
|
1999 |
|
3 |
p. 16-20 |
artikel |
4 |
An Overview of Modern Cryptography
|
Gove, Ronald A. |
|
1997 |
|
3 |
p. 55-68 |
artikel |
5 |
A review of: “Computer Encryptions in Whispering Caves by D. Larry Crumbley, L. Murphy Smith, and Edith Battles, published by Dame Publications, Inc., 1998”
|
Poore, Ralph Spencer |
|
1998 |
|
3 |
p. 18-19 |
artikel |
6 |
Are Your Computer Files Protected Under the Fourth Amendment?
|
Hoebich, Marianne |
|
2008 |
|
3 |
p. 143-150 |
artikel |
7 |
As I See It …
|
Poore, Ralph Spencer |
|
1998 |
|
3 |
p. 3-4 |
artikel |
8 |
A Situational Approach to Integrity
|
DeMaio, Harry B. |
|
1993 |
|
3 |
p. 5-9 |
artikel |
9 |
Best Practices
|
Poore, Ralph Spencer |
|
1998 |
|
3 |
p. 13-15 |
artikel |
10 |
Beyond the Maginot-Line Mentality: A Total-Process View of Information Security Risk Management
|
Paliotta, Allan R. |
|
2001 |
|
3 |
p. 1-30 |
artikel |
11 |
Biometrics, Evidence, and Personal Privacy
|
Freeman, Edward H. |
|
2003 |
|
3 |
p. 4-8 |
artikel |
12 |
Blended Threats: A New Era in Anti-Virus Protection
|
Gordineer, John |
|
2003 |
|
3 |
p. 45-47 |
artikel |
13 |
Building an Effective Privacy Program
|
Herold, Rebecca |
|
2006 |
|
3 |
p. 24-35 |
artikel |
14 |
Calendar
|
|
|
1998 |
|
3 |
p. 80 |
artikel |
15 |
Closed Serve at the Open Net
|
Poore, Ralph S. |
|
1995 |
|
3 |
p. 22-26 |
artikel |
16 |
Coming of Age
|
Stephenson, Peter |
|
1999 |
|
3 |
p. 5-9 |
artikel |
17 |
Communications Security, LAN Security, and Viruses
|
Moeller, Robert R. |
|
1994 |
|
3 |
p. 32-36 |
artikel |
18 |
Comparing MVS and UNIX Security: The View from the Glass House
|
Goldis, Peter D. |
|
1993 |
|
3 |
p. 38-52 |
artikel |
19 |
Content Analysis of Web Privacy Policies in the GCC Countries
|
Shalhoub, Zeinab Karake |
|
2006 |
|
3 |
p. 36-45 |
artikel |
20 |
Cryptographic Threat Analysis
|
Parker, Donn B. |
|
1993 |
|
3 |
p. 13-17 |
artikel |
21 |
Data Encryption
|
Sobol, Michael I. |
|
1994 |
|
3 |
p. 27-31 |
artikel |
22 |
Defining Automated Crime
|
Parker, Donn B. |
|
1995 |
|
3 |
p. 16-21 |
artikel |
23 |
Denial of Service to Authorized Computer Users
|
Freeman, Edward H. |
|
2001 |
|
3 |
p. 1-5 |
artikel |
24 |
Developing the Office Recovery Plan
|
Logan, Andrew J. |
|
1993 |
|
3 |
p. 73-85 |
artikel |
25 |
Disaster Recovery Products and Services
|
Sobol, Michael I. |
|
1995 |
|
3 |
p. 27-31 |
artikel |
26 |
Doomed to Fail: The Secure Digital Music Initiative
|
Rothke, Ben |
|
2001 |
|
3 |
p. 1-5 |
artikel |
27 |
Effective Operational Security Metrics
|
Ravenel, J. Patrick |
|
2006 |
|
3 |
p. 10-17 |
artikel |
28 |
Efficient Tree Search in Encrypted Data
|
Brinkman, R. |
|
2004 |
|
3 |
p. 14-21 |
artikel |
29 |
Electronic Commerce Security
|
Cullinane, David |
|
1998 |
|
3 |
p. 54-65 |
artikel |
30 |
E-Mail Archiving: Understanding the Reasons, Risks, and Rewards
|
Chen, Paul |
|
2006 |
|
3 |
p. 18-23 |
artikel |
31 |
Email Privacy and the Wiretap Act: U.S. v. Councilman
|
Freeman, Edward H. |
|
2007 |
|
3 |
p. 182-185 |
artikel |
32 |
Employing Encryption to Secure Consumer Data
|
Toubba, Karim |
|
2006 |
|
3 |
p. 46-54 |
artikel |
33 |
Enterprise Vulnerability Management and Its Role in Information Security Management
|
Nyanchama, Matunda |
|
2005 |
|
3 |
p. 29-56 |
artikel |
34 |
Evaluating Anti-Virus Software: Which Is Best?
|
Dunham, Ken |
|
2003 |
|
3 |
p. 17-28 |
artikel |
35 |
Exploiting the Power of Message Authentication Codes
|
Lambert, Sandra M. |
|
1994 |
|
3 |
p. 53-63 |
artikel |
36 |
Fair Trading Protocol with Offline Anonymous Credit Card Payment
|
Zhao, Weiliang |
|
2004 |
|
3 |
p. 41-47 |
artikel |
37 |
Fear Commerce: Inflationary Effects of Global Security Initiatives
|
Workman, Michael |
|
2008 |
|
3 |
p. 124-131 |
artikel |
38 |
Fighting Spyware and Adware in the Enterprise
|
Gordon, Sarah |
|
2005 |
|
3 |
p. 14-17 |
artikel |
39 |
Filtering Spam at E-Mail Server Level with Improved CRM114
|
Mendez, Victor |
|
2004 |
|
3 |
p. 48-55 |
artikel |
40 |
FROM THE EDITOR
|
Parker, Donn B. |
|
1994 |
|
3 |
p. 3-4 |
artikel |
41 |
FROM THE EDITOR
|
Parker, Donn B. |
|
1995 |
|
3 |
p. 3 |
artikel |
42 |
From the Editor
|
Parker, Donn B. |
|
1993 |
|
3 |
p. 1-4 |
artikel |
43 |
From the Editor's Desk
|
Namuduri, Kamesh |
|
2007 |
|
3 |
p. 133 |
artikel |
44 |
From the Editor's Desk
|
Namuduri, Kamesh |
|
2008 |
|
3 |
p. 109 |
artikel |
45 |
Goal Setting and Trust in a Security Management Context
|
Koskosas, Ioannis |
|
2008 |
|
3 |
p. 151-161 |
artikel |
46 |
Got Spam?
|
Tiller, Jim S. |
|
2005 |
|
3 |
p. 2-4 |
artikel |
47 |
Government-Based Security Standards
|
White, Gregory |
|
1997 |
|
3 |
p. 9-19 |
artikel |
48 |
Hacking the Nation-State: Security, Information Technology and Policies of Assurance
|
Bronk, Chris |
|
2008 |
|
3 |
p. 132-142 |
artikel |
49 |
Harnessing Mainframe Strengths for an Enterprisewide Backup Solution
|
Hout, Glenn |
|
1995 |
|
3 |
p. 46-51 |
artikel |
50 |
How Companies Are Approaching Open Systems Security
|
DeMaio, Harry B. |
|
1995 |
|
3 |
p. 5-11 |
artikel |
51 |
Identity Theft: Who Are You Anyway?
|
Poore, Ralph Spencer |
|
2001 |
|
3 |
p. 1-6 |
artikel |
52 |
Implementing Information Lifecycle Security (ILS)
|
Reed, Bill |
|
2007 |
|
3 |
p. 177-181 |
artikel |
53 |
Information Classification
|
Peltier, Thomas R. |
|
1998 |
|
3 |
p. 31-43 |
artikel |
54 |
Information Security: Behind the Telecommuting Power Curve
|
DeMaio, Harry B. |
|
1994 |
|
3 |
p. 5-10 |
artikel |
55 |
Information Security, Business, and the Internet
|
Blatchford, Clive |
|
1998 |
|
3 |
p. 44-53 |
artikel |
56 |
Information System Security Training: Making it Happen, Part 2
|
Hansche, Susan |
|
2001 |
|
3 |
p. 1-20 |
artikel |
57 |
Information Warfare: A New Threat to Information Security and Integrity
|
Madsen, Wayne |
|
1995 |
|
3 |
p. 12-15 |
artikel |
58 |
International ITSEC Standards: INTEL Isn't Inside
|
Madsen, Wayne |
|
1994 |
|
3 |
p. 11-15 |
artikel |
59 |
Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues
|
Stewart, Farley |
|
2000 |
|
3 |
p. 1-7 |
artikel |
60 |
IT Security: A Tactical War
|
Lobree, Bruce A. |
|
2003 |
|
3 |
p. 9-16 |
artikel |
61 |
Malicious Software and Hacking
|
Ferbrache, David |
|
1997 |
|
3 |
p. 35-54 |
artikel |
62 |
Meet Your Cracker Intrusion Management Using Criminal Profiling
|
Schlarman, Steve |
|
1999 |
|
3 |
p. 21-26 |
artikel |
63 |
Network and Internet Security
|
Bellovin, Steven |
|
1997 |
|
3 |
p. 20-34 |
artikel |
64 |
Network Sniffer Attacks
|
Creech, William H. |
|
1998 |
|
3 |
p. 20-30 |
artikel |
65 |
Novel Approaches to Contingency Planning and Security
|
Moeller, Robert R. |
|
1993 |
|
3 |
p. 34-37 |
artikel |
66 |
Open Source Software and the SCO Litigation
|
Freeman, Edward H. |
|
2006 |
|
3 |
p. 5-9 |
artikel |
67 |
Overcoming Wireless LAN Security Vulnerabilities
|
Held, Gilbert |
|
2002 |
|
3 |
p. 22-27 |
artikel |
68 |
Packet Sniffers and Network Monitors, Part 2
|
Tiller, Jim S. |
|
2000 |
|
3 |
p. 1-15 |
artikel |
69 |
Privacy and Dot.Com Bankruptcies: Protection of Personal Data
|
Freeman, Edward H. |
|
2005 |
|
3 |
p. 9-13 |
artikel |
70 |
Privacy and the Value of Personal Data
|
Poore, Ralph Spencer |
|
2000 |
|
3 |
p. 1-6 |
artikel |
71 |
“Professionalism”
|
Ott, Jeffrey L. |
|
1999 |
|
3 |
p. 3-4 |
artikel |
72 |
Protecting Communications Before Disaster Strikes
|
Bell, Judy K. |
|
1993 |
|
3 |
p. 63-72 |
artikel |
73 |
Protecting the Portable Computing Environment
|
Maier, Phillip Q. |
|
1995 |
|
3 |
p. 67-74 |
artikel |
74 |
Psychological Subversion of Information Systems
|
Kaplan, Ray |
|
1993 |
|
3 |
p. 53-62 |
artikel |
75 |
Release for Public Comment
|
Poore, Ralph Spencer |
|
1999 |
|
3 |
p. 27-77 |
artikel |
76 |
Remembered Secrets: Multisession Systems, LANs, and Other Hiding Places
|
Poore, Ralph S. |
|
1994 |
|
3 |
p. 23-26 |
artikel |
77 |
Rootkits and Their Effects on Information Security
|
Beegle, Lynn Erla |
|
2007 |
|
3 |
p. 164-176 |
artikel |
78 |
Search and Seizure of Computer Equipment
|
Freeman, Edward H. |
|
1999 |
|
3 |
p. 10-15 |
artikel |
79 |
Securing Small Business Computer Networks: An Examination of Primary Security Threats and Their Solutions
|
Gercek, Gokhan |
|
2005 |
|
3 |
p. 18-28 |
artikel |
80 |
Security for Enterprise Resource Planning Systems
|
She, Wei |
|
2007 |
|
3 |
p. 152-163 |
artikel |
81 |
Security in Cyberspace (and Some Legal Issues)
|
Moeller, Robert R. |
|
1995 |
|
3 |
p. 32-37 |
artikel |
82 |
Security in Open Networks: A Contradiction in Terms?
|
Poore, Ralph Spencer |
|
1993 |
|
3 |
p. 18-22 |
artikel |
83 |
Selecting an IT Control Framework
|
Schlarman, Steven |
|
2007 |
|
3 |
p. 147-151 |
artikel |
84 |
Single Sign-on and Security in a Client/Server Environment
|
Massaro, Ralph P. |
|
1995 |
|
3 |
p. 38-45 |
artikel |
85 |
Single Sign-On: Is It Really Possible?
|
Chinitz, Jonathan |
|
2000 |
|
3 |
p. 1-14 |
artikel |
86 |
Standards or Best Practices — Conflicting Interests
|
Stephenson, Peter |
|
2000 |
|
3 |
p. 1-6 |
artikel |
87 |
Structured Investigation of Digital Incidents in Complex Computing Environments
|
Stephenson, Peter |
|
2003 |
|
3 |
p. 29-38 |
artikel |
88 |
Telecommunications Security Products and Services
|
Sobol, Michael I. |
|
1993 |
|
3 |
p. 28-33 |
artikel |
89 |
The Clipper Chip Controversy
|
Bidzos, James |
|
1993 |
|
3 |
p. 10-12 |
artikel |
90 |
The Communications Assistance for Law Enforcement Act (CALEA)
|
Guhl, Stephen D. |
|
2008 |
|
3 |
p. 110-113 |
artikel |
91 |
The Dot Bombs …
|
Ott, Jeffrey L. |
|
2001 |
|
3 |
p. 1-3 |
artikel |
92 |
The Fight for International Security Solutions
|
Blatchford, Clive W. |
|
1993 |
|
3 |
p. 23-27 |
artikel |
93 |
The Future of Wireless Communications
|
Rosenbaum, Robert |
|
2002 |
|
3 |
p. 4-13 |
artikel |
94 |
The Impact of Virus Attack Announcements on the Market Value of Firms
|
Hovav, Anat |
|
2004 |
|
3 |
p. 32-40 |
artikel |
95 |
The New Frontier: Clieht/Server and Agent Technology
|
Molini, James E. |
|
1994 |
|
3 |
p. 64-71 |
artikel |
96 |
The Thirty-Minute Risk Analysis
|
Erwin, Dan |
|
1994 |
|
3 |
p. 37-44 |
artikel |
97 |
The Value Proposition of Information Security: Putting The Pieces In Place
|
Ott, Jeffrey L. |
|
2000 |
|
3 |
p. 1-3 |
artikel |
98 |
The War on Words
|
Ott, Jeffrey L. |
|
2003 |
|
3 |
p. 2-3 |
artikel |
99 |
The WOSIS 2004 Conference
|
|
|
2004 |
|
3 |
p. 2-4 |
artikel |
100 |
Thinking Right About Network Security
|
Stackpole, Bill |
|
1998 |
|
3 |
p. 16-17 |
artikel |
101 |
Top 10 Dial-In Security Mistakes
|
Smartt, Heather |
|
1998 |
|
3 |
p. 5-8 |
artikel |
102 |
Top 10 Ways to Prevent Denial of Service Attacks
|
Walters, Ryan |
|
2001 |
|
3 |
p. 1-2 |
artikel |
103 |
Towards a Systematic Development of Secure Systems
|
Breu, Ruth |
|
2004 |
|
3 |
p. 5-13 |
artikel |
104 |
Understanding Security and Audit Issues in Electronic Document Interchange
|
Menkus, Belden |
|
1998 |
|
3 |
p. 66-79 |
artikel |
105 |
Understanding the Denial of Service Threat
|
Menkus, Belden |
|
1997 |
|
3 |
p. 3-8 |
artikel |
106 |
UNIX and Security: The Influences of History
|
Spafford, Eugene H. |
|
1995 |
|
3 |
p. 52-60 |
artikel |
107 |
Update on Cryptography: Who Will Keep the Keys?
|
Parker, Donn B. |
|
1994 |
|
3 |
p. 16-22 |
artikel |
108 |
Virtual Security: The New Security Tool?
|
Tiller, James |
|
2006 |
|
3 |
p. 2-4 |
artikel |
109 |
VoIP Security — Attacks and Solutions
|
Phithakkitnukoon, Santi |
|
2008 |
|
3 |
p. 114-123 |
artikel |
110 |
We Are One, We Are Borg
|
Ott, Jeffrey L. |
|
2002 |
|
3 |
p. 2-3 |
artikel |
111 |
Web Services Security: Is the Problem Solved?
|
Gutierrez, Carlos |
|
2004 |
|
3 |
p. 22-31 |
artikel |
112 |
When Technology and Privacy Collide
|
Freeman, Edward H. |
|
1995 |
|
3 |
p. 62-66 |
artikel |
113 |
Will Big Brother Cause Your Company to Be Sued?
|
Holmes, Judy D. |
|
2003 |
|
3 |
p. 39-44 |
artikel |
114 |
Wireless Application Protocol (WAP) and Mobile Wireless Access
|
Llana, Andres |
|
2002 |
|
3 |
p. 14-21 |
artikel |
115 |
Wireless Handheld Devices Become Trusted Network Devices
|
Curran, Kevin |
|
2007 |
|
3 |
p. 134-146 |
artikel |
116 |
Wireless Internet Security
|
Lee, Dennis Seymour |
|
2002 |
|
3 |
p. 34-50 |
artikel |
117 |
Wireless LAN Security
|
Andress, Mandy |
|
2002 |
|
3 |
p. 29-33 |
artikel |
118 |
Wireless Worries and Wisdom
|
Dunham, Ken |
|
2005 |
|
3 |
p. 5-8 |
artikel |