nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An important reminder
|
Wolfe, HenryB. |
|
1995 |
1995 |
4 |
p. 16-18 3 p. |
artikel |
2 |
AT&T aligns with VLSI for cryptography chips
|
Zajac Jr., BernardP. |
|
1995 |
1995 |
4 |
p. 6- 1 p. |
artikel |
3 |
‘Call forwarding’ used to steal competitors' business
|
Menkus, Belden |
|
1995 |
1995 |
4 |
p. 3-4 2 p. |
artikel |
4 |
CIAC warns of serious NCSA WWW vulnerability
|
|
|
1995 |
1995 |
4 |
p. 2-3 2 p. |
artikel |
5 |
Computer security surveys
|
Collinson, Helen |
|
1995 |
1995 |
4 |
p. 8-10 3 p. |
artikel |
6 |
Copyright piracy trade war averted
|
|
|
1995 |
1995 |
4 |
p. 4- 1 p. |
artikel |
7 |
Events
|
|
|
1995 |
1995 |
4 |
p. 20- 1 p. |
artikel |
8 |
Fraud Watch: A Guide for Business
|
Sommer, Peter |
|
1995 |
1995 |
4 |
p. 18-19 2 p. |
artikel |
9 |
Hong Kong police shut down networks
|
|
|
1995 |
1995 |
4 |
p. 4- 1 p. |
artikel |
10 |
How to protect ourselves from information
|
Ongetta, Silvano |
|
1995 |
1995 |
4 |
p. 13-16 4 p. |
artikel |
11 |
Marketplace
|
|
|
1995 |
1995 |
4 |
p. 5- 1 p. |
artikel |
12 |
Natas spreads in southwestern United States
|
|
|
1995 |
1995 |
4 |
p. 4-5 2 p. |
artikel |
13 |
PC used to steal ¥140 million
|
Menkus, Belden |
|
1995 |
1995 |
4 |
p. 3- 1 p. |
artikel |
14 |
Power users beware
|
Armstrong, Lisa |
|
1995 |
1995 |
4 |
p. 7-8 2 p. |
artikel |
15 |
Slowly becoming standard
|
Snell, Monica |
|
1995 |
1995 |
4 |
p. 6-7 2 p. |
artikel |
16 |
Stop press
|
|
|
1995 |
1995 |
4 |
p. 20- 1 p. |
artikel |
17 |
Sungard virus
|
Armstrong, Lisa |
|
1995 |
1995 |
4 |
p. 7- 1 p. |
artikel |
18 |
The hacker composite: a necessary security tool?
|
Dwan, Berni |
|
1995 |
1995 |
4 |
p. 10-13 4 p. |
artikel |
19 |
UNIRAS computer security made public
|
McCormack, Michael |
|
1995 |
1995 |
4 |
p. 1-2 2 p. |
artikel |
20 |
US most wanted hacker arrested
|
Zajac Jr., BernardP. |
|
1995 |
1995 |
4 |
p. 3- 1 p. |
artikel |