nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A high speed software implementation of the Data Encryption Standard
|
Shepherd, Simon J. |
|
1995 |
14 |
4 |
p. 349-357 9 p. |
artikel |
2 |
A new standard is proposed for electronic verification
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 298- 1 p. |
artikel |
3 |
Big business on the net? Not yet
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 301- 1 p. |
artikel |
4 |
Build great firewalls
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 301-302 2 p. |
artikel |
5 |
Calendar
|
|
|
1995 |
14 |
4 |
p. 303-304 2 p. |
artikel |
6 |
Classification services in the SWORD secure DBMS
|
Wiseman, Simon R. |
|
1995 |
14 |
4 |
p. 307-321 15 p. |
artikel |
7 |
Forum to bring security to ATM
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 300-301 2 p. |
artikel |
8 |
From the editor
|
|
|
1995 |
14 |
4 |
p. 272-273 2 p. |
artikel |
9 |
Hacker heaven: so many computers so few safe-guards
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 300- 1 p. |
artikel |
10 |
IFIP Technical Committee 11
|
|
|
1995 |
14 |
4 |
p. 358-360 3 p. |
artikel |
11 |
IMB targets market for anti-virus software
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 299- 1 p. |
artikel |
12 |
International board of referees
|
|
|
1995 |
14 |
4 |
p. 305-306 2 p. |
artikel |
13 |
ISO 9000 and information security
|
Wood, Charles Cresson |
|
1995 |
14 |
4 |
p. 287-288 2 p. |
artikel |
14 |
Net security reawakening
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 299-300 2 p. |
artikel |
15 |
Online ‘firewalls’ aim to keep spies in cold
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 298- 1 p. |
artikel |
16 |
Only disconnect: can pornography in Cyberspace be regulated?
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 297- 1 p. |
artikel |
17 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1995 |
14 |
4 |
p. 274-282 9 p. |
artikel |
18 |
Recovering computer-generated evidence
|
Kovacich, Gerald |
|
1995 |
14 |
4 |
p. 289-296 8 p. |
artikel |
19 |
Redundant access rights
|
O'Shea, Greg |
|
1995 |
14 |
4 |
p. 323-348 26 p. |
artikel |
20 |
Safeguarding databases: basic concepts revisited
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 302- 1 p. |
artikel |
21 |
Satan: good or evil?
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 300- 1 p. |
artikel |
22 |
Secure all stations
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 301- 1 p. |
artikel |
23 |
Securicor offers data strongroom
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 299- 1 p. |
artikel |
24 |
Security: on-line business: safer than you think?
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 302- 1 p. |
artikel |
25 |
Security: the complex crypto relationship
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 299- 1 p. |
artikel |
26 |
Shifting information systems security responsibility from user organizations to vendor/publisher organizations
|
Wood, Charles Cresson |
|
1995 |
14 |
4 |
p. 283-284 2 p. |
artikel |
27 |
Step away from that firewall with your hands up
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 300- 1 p. |
artikel |
28 |
Stomping out cybersmut
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 299- 1 p. |
artikel |
29 |
Swedish pirates rumbled
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 297- 1 p. |
artikel |
30 |
Tales from the encrypt
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 299- 1 p. |
artikel |
31 |
Testing the disaster recovery plan
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 302- 1 p. |
artikel |
32 |
US to propose federal agency to secure information highway
|
Collinson, Helen |
|
1995 |
14 |
4 |
p. 297-298 2 p. |
artikel |