nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
America Online girds against hacker break-ins
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 519- 1 p. |
artikel |
2 |
An expensive lesson for bulletin board user
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 520- 1 p. |
artikel |
3 |
Another brick in the firewall
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 521- 1 p. |
artikel |
4 |
Calendar
|
|
|
1995 |
14 |
6 |
p. 523-524 2 p. |
artikel |
5 |
Controls in the next millennium: Anticipating the IT-enabled future
|
Krull, Alan R. |
|
1995 |
14 |
6 |
p. 491-495 5 p. |
artikel |
6 |
Document describing virus contains one
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 519- 1 p. |
artikel |
7 |
Feds limit info warfare role
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 522- 1 p. |
artikel |
8 |
From the Editor
|
|
|
1995 |
14 |
6 |
p. 478-479 2 p. |
artikel |
9 |
How to protect distributed data
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 521- 1 p. |
artikel |
10 |
IFIP technical committee 11
|
|
|
1995 |
14 |
6 |
p. 567-569 3 p. |
artikel |
11 |
In Rindos v Hardwick
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 520-521 2 p. |
artikel |
12 |
International board of referees
|
|
|
1995 |
14 |
6 |
p. 525-526 2 p. |
artikel |
13 |
Internet users fret over spies' new role
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 518- 1 p. |
artikel |
14 |
Malicious Word virus found on the Internet
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 519- 1 p. |
artikel |
15 |
MCF: a malicious code filter
|
Lo, Raymond W. |
|
1995 |
14 |
6 |
p. 541-566 26 p. |
artikel |
16 |
Microsoft criticized over Internet security claims
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 520- 1 p. |
artikel |
17 |
Open systems security: Traps and pitfalls
|
Reid, Jim |
|
1995 |
14 |
6 |
p. 496-517 22 p. |
artikel |
18 |
Privacy, anonymity and accountability
|
Oliver, Claude |
|
1995 |
14 |
6 |
p. 489-490 2 p. |
artikel |
19 |
Random bits & bytes
|
Joseph Highland, Harold |
|
1995 |
14 |
6 |
p. 480-488 9 p. |
artikel |
20 |
Routers get security auditing software
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 521- 1 p. |
artikel |
21 |
Safe secret
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 519-520 2 p. |
artikel |
22 |
SATAN and Courtney: a devil of a team
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 522- 1 p. |
artikel |
23 |
Security flaw found in Netscape software
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 518- 1 p. |
artikel |
24 |
Six hackers stung by undercover cybercops
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 518-519 2 p. |
artikel |
25 |
Taking the measure of NetWare antivirus software
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 522- 1 p. |
artikel |
26 |
The need for decentralization and privacy in mobile communications networks
|
Stoll, Frank |
|
1995 |
14 |
6 |
p. 527-539 13 p. |
artikel |
27 |
Think you're virus-proof? Think again
|
Collinson, Helen |
|
1995 |
14 |
6 |
p. 521-522 2 p. |
artikel |