nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Half-Dozen Rules for Securing Your Web Application
|
Forsythe, Charles |
|
1998 |
7 |
3 |
p. 9-12 |
artikel |
2 |
A review of: “Computer Encryptions in Whispering Caves by D. Larry Crumbley, L. Murphy Smith, and Edith Battles, published by Dame Publications, Inc., 1998”
|
Poore, Ralph Spencer |
|
1998 |
7 |
3 |
p. 18-19 |
artikel |
3 |
As I See It …
|
Poore, Ralph Spencer |
|
1998 |
7 |
3 |
p. 3-4 |
artikel |
4 |
Best Practices
|
Poore, Ralph Spencer |
|
1998 |
7 |
3 |
p. 13-15 |
artikel |
5 |
Calendar
|
|
|
1998 |
7 |
3 |
p. 80 |
artikel |
6 |
Electronic Commerce Security
|
Cullinane, David |
|
1998 |
7 |
3 |
p. 54-65 |
artikel |
7 |
Information Classification
|
Peltier, Thomas R. |
|
1998 |
7 |
3 |
p. 31-43 |
artikel |
8 |
Information Security, Business, and the Internet
|
Blatchford, Clive |
|
1998 |
7 |
3 |
p. 44-53 |
artikel |
9 |
Network Sniffer Attacks
|
Creech, William H. |
|
1998 |
7 |
3 |
p. 20-30 |
artikel |
10 |
Thinking Right About Network Security
|
Stackpole, Bill |
|
1998 |
7 |
3 |
p. 16-17 |
artikel |
11 |
Top 10 Dial-In Security Mistakes
|
Smartt, Heather |
|
1998 |
7 |
3 |
p. 5-8 |
artikel |
12 |
Understanding Security and Audit Issues in Electronic Document Interchange
|
Menkus, Belden |
|
1998 |
7 |
3 |
p. 66-79 |
artikel |