Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             52 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 AIN'T misbehaving—A taxonomy of anti-intrusion techniques Highland, Harold Joseph
1995
14 7 p. 606-
1 p.
artikel
2 Alarm at increase in civil service crime Collinson, Helen
1995
14 7 p. 611-
1 p.
artikel
3 A methodology for the design of security plans de Koning, W.Fred.
1995
14 7 p. 633-643
11 p.
artikel
4 An open trusted enterprise network architecture Highland, Harold Joseph
1995
14 7 p. 609-
1 p.
artikel
5 A perspective of evaluation in the UK versus the US Highland, Harold Joseph
1995
14 7 p. 607-608
2 p.
artikel
6 A software architecture to support misuse intrusion detection Highland, Harold Joseph
1995
14 7 p. 607-
1 p.
artikel
7 Authorship analysis: Identifying the author of a program Highland, Harold Joseph
1995
14 7 p. 609-610
2 p.
artikel
8 BSA toughens up on pirates Collinson, Helen
1995
14 7 p. 612-
1 p.
artikel
9 Calendar 1995
14 7 p. 617-618
2 p.
artikel
10 Component architectures for trusted netware Highland, Harold Joseph
1995
14 7 p. 609-
1 p.
artikel
11 Contingency planning: What to do when bad things happen to good systems Highland, Harold Joseph
1995
14 7 p. 609-
1 p.
artikel
12 Controlling the use of cryptographic keys Holloway, Christopher J
1995
14 7 p. 587-598
12 p.
artikel
13 Critical factors of key escrow encryption systems Highland, Harold Joseph
1995
14 7 p. 608-
1 p.
artikel
14 ECMA's approach for IT security evalutaions Highland, Harold Joseph
1995
14 7 p. 608-
1 p.
artikel
15 E-mail security ignored Collinson, Helen
1995
14 7 p. 614-
1 p.
artikel
16 Evaluting the strength of ciphers Highland, Harold Joseph
1995
14 7 p. 608-
1 p.
artikel
17 Faced with a password solution Collinson, Helen
1995
14 7 p. 613-
1 p.
artikel
18 From the editor 1995
14 7 p. 572-573
2 p.
artikel
19 How secure is security? Collinson, Helen
1995
14 7 p. 615-616
2 p.
artikel
20 IBM unveils web servers, internet firewall Collinson, Helen
1995
14 7 p. 616-
1 p.
artikel
21 IFIP technical committee 11 1995
14 7 p. 653-655
3 p.
artikel
22 International board of referees 1995
14 7 p. 619-620
2 p.
artikel
23 Internet 101 Gordon, Sarah
1995
14 7 p. 599-604
6 p.
artikel
24 Internet sniffer attacks Highland, Harold Joseph
1995
14 7 p. 610-
1 p.
artikel
25 Invasions of privacy Collinson, Helen
1995
14 7 p. 616-
1 p.
artikel
26 Joint action group fights computer crime Collinson, Helen
1995
14 7 p. 613-
1 p.
artikel
27 Maintaining privacy in electronic transactions Highland, Harold Joseph
1995
14 7 p. 606-607
2 p.
artikel
28 Maintaining secretary and integrity in multilevel databases: A practical approach Highland, Harold Joseph
1995
14 7 p. 605-606
2 p.
artikel
29 Managing computer crime: a research outlook Backhouse, James
1995
14 7 p. 645-651
7 p.
artikel
30 MCII offers secure transaction service Collinson, Helen
1995
14 7 p. 614-615
2 p.
artikel
31 More security woes plague the Internet Collinson, Helen
1995
14 7 p. 613-614
2 p.
artikel
32 Net surfer convicted for cache of child porn disks Collinson, Helen
1995
14 7 p. 612-
1 p.
artikel
33 Oracle extinguishes 'net security fears Collinson, Helen
1995
14 7 p. 615-
1 p.
artikel
34 Pressure builds on chip thieves Collinson, Helen
1995
14 7 p. 612-613
2 p.
artikel
35 Protect your e-mail Collinson, Helen
1995
14 7 p. 614-
1 p.
artikel
36 Raids target piracy suspects Collinson, Helen
1995
14 7 p. 612-
1 p.
artikel
37 Random bits & bytes Highland, Harold Joseph
1995
14 7 p. 574-585
12 p.
artikel
38 Securing local area and metropolitan area network: A practical approach Highland, Harold Joseph
1995
14 7 p. 607-
1 p.
artikel
39 Security and data integrity for LANS and WANs Collinson, Helen
1995
14 7 p. 616-
1 p.
artikel
40 Security and software reuse Highland, Harold Joseph
1995
14 7 p. 608-
1 p.
artikel
41 Security environment reviews Collinson, Helen
1995
14 7 p. 616-
1 p.
artikel
42 Security expert warns of night-time intruders Collinson, Helen
1995
14 7 p. 611-
1 p.
artikel
43 Sentry cuts access to naughty bits Collinson, Helen
1995
14 7 p. 615-
1 p.
artikel
44 Setting optimal intrusion-detection thresholds Soh, B.C.
1995
14 7 p. 621-631
11 p.
artikel
45 Social engineering; The only real test of information systems security plans Highland, Harold Joseph
1995
14 7 p. 609-
1 p.
artikel
46 Software pirates treasure Win 95 Collinson, Helen
1995
14 7 p. 614-
1 p.
artikel
47 TCP/IP (lack of) security Highland, Harold Joseph
1995
14 7 p. 606-
1 p.
artikel
48 The controlled application set paradigm for trusted systems Highland, Harold Joseph
1995
14 7 p. 605-
1 p.
artikel
49 The table of contents for the 1st through the 17th national conputer security conferences Highland, Harold Joseph
1995
14 7 p. 610-
1 p.
artikel
50 Top cop says fingerprint system is fraud-beater Collinson, Helen
1995
14 7 p. 611-612
2 p.
artikel
51 Underground tools aid fledgling hackers Collinson, Helen
1995
14 7 p. 615-
1 p.
artikel
52 Using network traffic analysis as a security tool Highland, Harold Joseph
1995
14 7 p. 607-
1 p.
artikel
                             52 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland