nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AIN'T misbehaving—A taxonomy of anti-intrusion techniques
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 606- 1 p. |
artikel |
2 |
Alarm at increase in civil service crime
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 611- 1 p. |
artikel |
3 |
A methodology for the design of security plans
|
de Koning, W.Fred. |
|
1995 |
14 |
7 |
p. 633-643 11 p. |
artikel |
4 |
An open trusted enterprise network architecture
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 609- 1 p. |
artikel |
5 |
A perspective of evaluation in the UK versus the US
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 607-608 2 p. |
artikel |
6 |
A software architecture to support misuse intrusion detection
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 607- 1 p. |
artikel |
7 |
Authorship analysis: Identifying the author of a program
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 609-610 2 p. |
artikel |
8 |
BSA toughens up on pirates
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 612- 1 p. |
artikel |
9 |
Calendar
|
|
|
1995 |
14 |
7 |
p. 617-618 2 p. |
artikel |
10 |
Component architectures for trusted netware
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 609- 1 p. |
artikel |
11 |
Contingency planning: What to do when bad things happen to good systems
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 609- 1 p. |
artikel |
12 |
Controlling the use of cryptographic keys
|
Holloway, Christopher J |
|
1995 |
14 |
7 |
p. 587-598 12 p. |
artikel |
13 |
Critical factors of key escrow encryption systems
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 608- 1 p. |
artikel |
14 |
ECMA's approach for IT security evalutaions
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 608- 1 p. |
artikel |
15 |
E-mail security ignored
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 614- 1 p. |
artikel |
16 |
Evaluting the strength of ciphers
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 608- 1 p. |
artikel |
17 |
Faced with a password solution
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 613- 1 p. |
artikel |
18 |
From the editor
|
|
|
1995 |
14 |
7 |
p. 572-573 2 p. |
artikel |
19 |
How secure is security?
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 615-616 2 p. |
artikel |
20 |
IBM unveils web servers, internet firewall
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 616- 1 p. |
artikel |
21 |
IFIP technical committee 11
|
|
|
1995 |
14 |
7 |
p. 653-655 3 p. |
artikel |
22 |
International board of referees
|
|
|
1995 |
14 |
7 |
p. 619-620 2 p. |
artikel |
23 |
Internet 101
|
Gordon, Sarah |
|
1995 |
14 |
7 |
p. 599-604 6 p. |
artikel |
24 |
Internet sniffer attacks
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 610- 1 p. |
artikel |
25 |
Invasions of privacy
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 616- 1 p. |
artikel |
26 |
Joint action group fights computer crime
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 613- 1 p. |
artikel |
27 |
Maintaining privacy in electronic transactions
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 606-607 2 p. |
artikel |
28 |
Maintaining secretary and integrity in multilevel databases: A practical approach
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 605-606 2 p. |
artikel |
29 |
Managing computer crime: a research outlook
|
Backhouse, James |
|
1995 |
14 |
7 |
p. 645-651 7 p. |
artikel |
30 |
MCII offers secure transaction service
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 614-615 2 p. |
artikel |
31 |
More security woes plague the Internet
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 613-614 2 p. |
artikel |
32 |
Net surfer convicted for cache of child porn disks
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 612- 1 p. |
artikel |
33 |
Oracle extinguishes 'net security fears
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 615- 1 p. |
artikel |
34 |
Pressure builds on chip thieves
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 612-613 2 p. |
artikel |
35 |
Protect your e-mail
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 614- 1 p. |
artikel |
36 |
Raids target piracy suspects
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 612- 1 p. |
artikel |
37 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 574-585 12 p. |
artikel |
38 |
Securing local area and metropolitan area network: A practical approach
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 607- 1 p. |
artikel |
39 |
Security and data integrity for LANS and WANs
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 616- 1 p. |
artikel |
40 |
Security and software reuse
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 608- 1 p. |
artikel |
41 |
Security environment reviews
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 616- 1 p. |
artikel |
42 |
Security expert warns of night-time intruders
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 611- 1 p. |
artikel |
43 |
Sentry cuts access to naughty bits
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 615- 1 p. |
artikel |
44 |
Setting optimal intrusion-detection thresholds
|
Soh, B.C. |
|
1995 |
14 |
7 |
p. 621-631 11 p. |
artikel |
45 |
Social engineering; The only real test of information systems security plans
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 609- 1 p. |
artikel |
46 |
Software pirates treasure Win 95
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 614- 1 p. |
artikel |
47 |
TCP/IP (lack of) security
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 606- 1 p. |
artikel |
48 |
The controlled application set paradigm for trusted systems
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 605- 1 p. |
artikel |
49 |
The table of contents for the 1st through the 17th national conputer security conferences
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 610- 1 p. |
artikel |
50 |
Top cop says fingerprint system is fraud-beater
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 611-612 2 p. |
artikel |
51 |
Underground tools aid fledgling hackers
|
Collinson, Helen |
|
1995 |
14 |
7 |
p. 615- 1 p. |
artikel |
52 |
Using network traffic analysis as a security tool
|
Highland, Harold Joseph |
|
1995 |
14 |
7 |
p. 607- 1 p. |
artikel |