nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An efficient password authentication scheme based on a unit circle
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 220- 1 p. |
artikel |
2 |
Biometrics, is it a viable proposition for identity authentication and access control?
|
Kim, Hyun-Jung |
|
1995 |
14 |
3 |
p. 205-214 10 p. |
artikel |
3 |
Calendar
|
|
|
1995 |
14 |
3 |
p. 221-222 2 p. |
artikel |
4 |
Classification of objects for improved access control
|
Booysen, H.A.S. |
|
1995 |
14 |
3 |
p. 251-265 15 p. |
artikel |
5 |
Cyberspace lawsuits
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 220- 1 p. |
artikel |
6 |
Feds target the internet
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 218-219 2 p. |
artikel |
7 |
Firewalls come under fire
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 218- 1 p. |
artikel |
8 |
Fresh drive on mobile phone fraud
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 218- 1 p. |
artikel |
9 |
From the editor
|
|
|
1995 |
14 |
3 |
p. 186-187 2 p. |
artikel |
10 |
Hacker-trackers hunt electronic cybercrooks
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 216-217 2 p. |
artikel |
11 |
Hot on the hackers trail
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 215- 1 p. |
artikel |
12 |
IFIP technical committee 11
|
|
|
1995 |
14 |
3 |
p. 267-269 3 p. |
artikel |
13 |
Improving system security via proactive password checking
|
Bishop, Matt |
|
1995 |
14 |
3 |
p. 233-249 17 p. |
artikel |
14 |
International Board of Referees
|
|
|
1995 |
14 |
3 |
p. 223-224 2 p. |
artikel |
15 |
Internet security boost
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 217- 1 p. |
artikel |
16 |
Internet security holes abound
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 216- 1 p. |
artikel |
17 |
Keeping business safe on the Internet
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 219- 1 p. |
artikel |
18 |
Living dangerously on the internet
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 217- 1 p. |
artikel |
19 |
New computer system causes chaos
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 216- 1 p. |
artikel |
20 |
Perceived acceptability of biometric security systems
|
Deane, Frank |
|
1995 |
14 |
3 |
p. 225-231 7 p. |
artikel |
21 |
Principles of information systems security
|
Heinlein, Edwin B. |
|
1995 |
14 |
3 |
p. 197-198 2 p. |
artikel |
22 |
Protecting your privacy
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 219-220 2 p. |
artikel |
23 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1995 |
14 |
3 |
p. 188-196 9 p. |
artikel |
24 |
Risk management & corporate security: A viable leadership and business solution designed to enhance corporations in the emerging marketplace
|
Hill, Scott |
|
1995 |
14 |
3 |
p. 199-204 6 p. |
artikel |
25 |
Secret plans
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 219- 1 p. |
artikel |
26 |
Secure Unix for enterprise computing
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 219- 1 p. |
artikel |
27 |
Securing the internet
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 218- 1 p. |
artikel |
28 |
Security alert
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 216- 1 p. |
artikel |
29 |
Summit addresses growth, security issues for internet
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 218- 1 p. |
artikel |
30 |
Virus threat gains momentum
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 215-216 2 p. |
artikel |
31 |
War declared on hackers
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 217- 1 p. |
artikel |
32 |
Winners & losers
|
Collinson, Helen |
|
1995 |
14 |
3 |
p. 215- 1 p. |
artikel |