Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             118 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Half-Dozen Rules for Securing Your Web Application Forsythe, Charles
1998
3 p. 9-12
artikel
2 A Multilevel Strategy for Combatting Viruses Piazza, Joseph
1994
3 p. 45-52
artikel
3 Anonymity, Privacy, and Trust Poore, Ralph Spencer
1999
3 p. 16-20
artikel
4 An Overview of Modern Cryptography Gove, Ronald A.
1997
3 p. 55-68
artikel
5 A review of: “Computer Encryptions in Whispering Caves by D. Larry Crumbley, L. Murphy Smith, and Edith Battles, published by Dame Publications, Inc., 1998” Poore, Ralph Spencer
1998
3 p. 18-19
artikel
6 Are Your Computer Files Protected Under the Fourth Amendment? Hoebich, Marianne
2008
3 p. 143-150
artikel
7 As I See It … Poore, Ralph Spencer
1998
3 p. 3-4
artikel
8 A Situational Approach to Integrity DeMaio, Harry B.
1993
3 p. 5-9
artikel
9 Best Practices Poore, Ralph Spencer
1998
3 p. 13-15
artikel
10 Beyond the Maginot-Line Mentality: A Total-Process View of Information Security Risk Management Paliotta, Allan R.
2001
3 p. 1-30
artikel
11 Biometrics, Evidence, and Personal Privacy Freeman, Edward H.
2003
3 p. 4-8
artikel
12 Blended Threats: A New Era in Anti-Virus Protection Gordineer, John
2003
3 p. 45-47
artikel
13 Building an Effective Privacy Program Herold, Rebecca
2006
3 p. 24-35
artikel
14 Calendar 1998
3 p. 80
artikel
15 Closed Serve at the Open Net Poore, Ralph S.
1995
3 p. 22-26
artikel
16 Coming of Age Stephenson, Peter
1999
3 p. 5-9
artikel
17 Communications Security, LAN Security, and Viruses Moeller, Robert R.
1994
3 p. 32-36
artikel
18 Comparing MVS and UNIX Security: The View from the Glass House Goldis, Peter D.
1993
3 p. 38-52
artikel
19 Content Analysis of Web Privacy Policies in the GCC Countries Shalhoub, Zeinab Karake
2006
3 p. 36-45
artikel
20 Cryptographic Threat Analysis Parker, Donn B.
1993
3 p. 13-17
artikel
21 Data Encryption Sobol, Michael I.
1994
3 p. 27-31
artikel
22 Defining Automated Crime Parker, Donn B.
1995
3 p. 16-21
artikel
23 Denial of Service to Authorized Computer Users Freeman, Edward H.
2001
3 p. 1-5
artikel
24 Developing the Office Recovery Plan Logan, Andrew J.
1993
3 p. 73-85
artikel
25 Disaster Recovery Products and Services Sobol, Michael I.
1995
3 p. 27-31
artikel
26 Doomed to Fail: The Secure Digital Music Initiative Rothke, Ben
2001
3 p. 1-5
artikel
27 Effective Operational Security Metrics Ravenel, J. Patrick
2006
3 p. 10-17
artikel
28 Efficient Tree Search in Encrypted Data Brinkman, R.
2004
3 p. 14-21
artikel
29 Electronic Commerce Security Cullinane, David
1998
3 p. 54-65
artikel
30 E-Mail Archiving: Understanding the Reasons, Risks, and Rewards Chen, Paul
2006
3 p. 18-23
artikel
31 Email Privacy and the Wiretap Act: U.S. v. Councilman Freeman, Edward H.
2007
3 p. 182-185
artikel
32 Employing Encryption to Secure Consumer Data Toubba, Karim
2006
3 p. 46-54
artikel
33 Enterprise Vulnerability Management and Its Role in Information Security Management Nyanchama, Matunda
2005
3 p. 29-56
artikel
34 Evaluating Anti-Virus Software: Which Is Best? Dunham, Ken
2003
3 p. 17-28
artikel
35 Exploiting the Power of Message Authentication Codes Lambert, Sandra M.
1994
3 p. 53-63
artikel
36 Fair Trading Protocol with Offline Anonymous Credit Card Payment Zhao, Weiliang
2004
3 p. 41-47
artikel
37 Fear Commerce: Inflationary Effects of Global Security Initiatives Workman, Michael
2008
3 p. 124-131
artikel
38 Fighting Spyware and Adware in the Enterprise Gordon, Sarah
2005
3 p. 14-17
artikel
39 Filtering Spam at E-Mail Server Level with Improved CRM114 Mendez, Victor
2004
3 p. 48-55
artikel
40 FROM THE EDITOR Parker, Donn B.
1994
3 p. 3-4
artikel
41 FROM THE EDITOR Parker, Donn B.
1995
3 p. 3
artikel
42 From the Editor Parker, Donn B.
1993
3 p. 1-4
artikel
43 From the Editor's Desk Namuduri, Kamesh
2007
3 p. 133
artikel
44 From the Editor's Desk Namuduri, Kamesh
2008
3 p. 109
artikel
45 Goal Setting and Trust in a Security Management Context Koskosas, Ioannis
2008
3 p. 151-161
artikel
46 Got Spam? Tiller, Jim S.
2005
3 p. 2-4
artikel
47 Government-Based Security Standards White, Gregory
1997
3 p. 9-19
artikel
48 Hacking the Nation-State: Security, Information Technology and Policies of Assurance Bronk, Chris
2008
3 p. 132-142
artikel
49 Harnessing Mainframe Strengths for an Enterprisewide Backup Solution Hout, Glenn
1995
3 p. 46-51
artikel
50 How Companies Are Approaching Open Systems Security DeMaio, Harry B.
1995
3 p. 5-11
artikel
51 Identity Theft: Who Are You Anyway? Poore, Ralph Spencer
2001
3 p. 1-6
artikel
52 Implementing Information Lifecycle Security (ILS) Reed, Bill
2007
3 p. 177-181
artikel
53 Information Classification Peltier, Thomas R.
1998
3 p. 31-43
artikel
54 Information Security: Behind the Telecommuting Power Curve DeMaio, Harry B.
1994
3 p. 5-10
artikel
55 Information Security, Business, and the Internet Blatchford, Clive
1998
3 p. 44-53
artikel
56 Information System Security Training: Making it Happen, Part 2 Hansche, Susan
2001
3 p. 1-20
artikel
57 Information Warfare: A New Threat to Information Security and Integrity Madsen, Wayne
1995
3 p. 12-15
artikel
58 International ITSEC Standards: INTEL Isn't Inside Madsen, Wayne
1994
3 p. 11-15
artikel
59 Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues Stewart, Farley
2000
3 p. 1-7
artikel
60 IT Security: A Tactical War Lobree, Bruce A.
2003
3 p. 9-16
artikel
61 Malicious Software and Hacking Ferbrache, David
1997
3 p. 35-54
artikel
62 Meet Your Cracker Intrusion Management Using Criminal Profiling Schlarman, Steve
1999
3 p. 21-26
artikel
63 Network and Internet Security Bellovin, Steven
1997
3 p. 20-34
artikel
64 Network Sniffer Attacks Creech, William H.
1998
3 p. 20-30
artikel
65 Novel Approaches to Contingency Planning and Security Moeller, Robert R.
1993
3 p. 34-37
artikel
66 Open Source Software and the SCO Litigation Freeman, Edward H.
2006
3 p. 5-9
artikel
67 Overcoming Wireless LAN Security Vulnerabilities Held, Gilbert
2002
3 p. 22-27
artikel
68 Packet Sniffers and Network Monitors, Part 2 Tiller, Jim S.
2000
3 p. 1-15
artikel
69 Privacy and Dot.Com Bankruptcies: Protection of Personal Data Freeman, Edward H.
2005
3 p. 9-13
artikel
70 Privacy and the Value of Personal Data Poore, Ralph Spencer
2000
3 p. 1-6
artikel
71 “Professionalism” Ott, Jeffrey L.
1999
3 p. 3-4
artikel
72 Protecting Communications Before Disaster Strikes Bell, Judy K.
1993
3 p. 63-72
artikel
73 Protecting the Portable Computing Environment Maier, Phillip Q.
1995
3 p. 67-74
artikel
74 Psychological Subversion of Information Systems Kaplan, Ray
1993
3 p. 53-62
artikel
75 Release for Public Comment Poore, Ralph Spencer
1999
3 p. 27-77
artikel
76 Remembered Secrets: Multisession Systems, LANs, and Other Hiding Places Poore, Ralph S.
1994
3 p. 23-26
artikel
77 Rootkits and Their Effects on Information Security Beegle, Lynn Erla
2007
3 p. 164-176
artikel
78 Search and Seizure of Computer Equipment Freeman, Edward H.
1999
3 p. 10-15
artikel
79 Securing Small Business Computer Networks: An Examination of Primary Security Threats and Their Solutions Gercek, Gokhan
2005
3 p. 18-28
artikel
80 Security for Enterprise Resource Planning Systems She, Wei
2007
3 p. 152-163
artikel
81 Security in Cyberspace (and Some Legal Issues) Moeller, Robert R.
1995
3 p. 32-37
artikel
82 Security in Open Networks: A Contradiction in Terms? Poore, Ralph Spencer
1993
3 p. 18-22
artikel
83 Selecting an IT Control Framework Schlarman, Steven
2007
3 p. 147-151
artikel
84 Single Sign-on and Security in a Client/Server Environment Massaro, Ralph P.
1995
3 p. 38-45
artikel
85 Single Sign-On: Is It Really Possible? Chinitz, Jonathan
2000
3 p. 1-14
artikel
86 Standards or Best Practices — Conflicting Interests Stephenson, Peter
2000
3 p. 1-6
artikel
87 Structured Investigation of Digital Incidents in Complex Computing Environments Stephenson, Peter
2003
3 p. 29-38
artikel
88 Telecommunications Security Products and Services Sobol, Michael I.
1993
3 p. 28-33
artikel
89 The Clipper Chip Controversy Bidzos, James
1993
3 p. 10-12
artikel
90 The Communications Assistance for Law Enforcement Act (CALEA) Guhl, Stephen D.
2008
3 p. 110-113
artikel
91 The Dot Bombs … Ott, Jeffrey L.
2001
3 p. 1-3
artikel
92 The Fight for International Security Solutions Blatchford, Clive W.
1993
3 p. 23-27
artikel
93 The Future of Wireless Communications Rosenbaum, Robert
2002
3 p. 4-13
artikel
94 The Impact of Virus Attack Announcements on the Market Value of Firms Hovav, Anat
2004
3 p. 32-40
artikel
95 The New Frontier: Clieht/Server and Agent Technology Molini, James E.
1994
3 p. 64-71
artikel
96 The Thirty-Minute Risk Analysis Erwin, Dan
1994
3 p. 37-44
artikel
97 The Value Proposition of Information Security: Putting The Pieces In Place Ott, Jeffrey L.
2000
3 p. 1-3
artikel
98 The War on Words Ott, Jeffrey L.
2003
3 p. 2-3
artikel
99 The WOSIS 2004 Conference 2004
3 p. 2-4
artikel
100 Thinking Right About Network Security Stackpole, Bill
1998
3 p. 16-17
artikel
101 Top 10 Dial-In Security Mistakes Smartt, Heather
1998
3 p. 5-8
artikel
102 Top 10 Ways to Prevent Denial of Service Attacks Walters, Ryan
2001
3 p. 1-2
artikel
103 Towards a Systematic Development of Secure Systems Breu, Ruth
2004
3 p. 5-13
artikel
104 Understanding Security and Audit Issues in Electronic Document Interchange Menkus, Belden
1998
3 p. 66-79
artikel
105 Understanding the Denial of Service Threat Menkus, Belden
1997
3 p. 3-8
artikel
106 UNIX and Security: The Influences of History Spafford, Eugene H.
1995
3 p. 52-60
artikel
107 Update on Cryptography: Who Will Keep the Keys? Parker, Donn B.
1994
3 p. 16-22
artikel
108 Virtual Security: The New Security Tool? Tiller, James
2006
3 p. 2-4
artikel
109 VoIP Security — Attacks and Solutions Phithakkitnukoon, Santi
2008
3 p. 114-123
artikel
110 We Are One, We Are Borg Ott, Jeffrey L.
2002
3 p. 2-3
artikel
111 Web Services Security: Is the Problem Solved? Gutierrez, Carlos
2004
3 p. 22-31
artikel
112 When Technology and Privacy Collide Freeman, Edward H.
1995
3 p. 62-66
artikel
113 Will Big Brother Cause Your Company to Be Sued? Holmes, Judy D.
2003
3 p. 39-44
artikel
114 Wireless Application Protocol (WAP) and Mobile Wireless Access Llana, Andres
2002
3 p. 14-21
artikel
115 Wireless Handheld Devices Become Trusted Network Devices Curran, Kevin
2007
3 p. 134-146
artikel
116 Wireless Internet Security Lee, Dennis Seymour
2002
3 p. 34-50
artikel
117 Wireless LAN Security Andress, Mandy
2002
3 p. 29-33
artikel
118 Wireless Worries and Wisdom Dunham, Ken
2005
3 p. 5-8
artikel
                             118 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland