nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cost model for managing information security hazards
|
Ekenberg, Love |
|
1995 |
14 |
8 |
p. 707-717 11 p. |
artikel |
2 |
A new model for information security policies
|
Lindup, Kenneth R. |
|
1995 |
14 |
8 |
p. 691-695 5 p. |
artikel |
3 |
Anti-virus software
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 700-701 2 p. |
artikel |
4 |
A piece of the 'Net action
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 697- 1 p. |
artikel |
5 |
Calendar
|
|
|
1995 |
14 |
8 |
p. 702-703 2 p. |
artikel |
6 |
Controlling digital signature services using a smartcard
|
Holloway, Christopher J |
|
1995 |
14 |
8 |
p. 681-690 10 p. |
artikel |
7 |
Cracking a social engineer
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 700- 1 p. |
artikel |
8 |
Cyberspace magistrates are proposed
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 698- 1 p. |
artikel |
9 |
Digital privacy… take two
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 696-697 2 p. |
artikel |
10 |
Economical, high-security payphone systems with Watermark Magnetics cards from Ascom
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 701- 1 p. |
artikel |
11 |
From the editor
|
|
|
1995 |
14 |
8 |
p. 658-659 2 p. |
artikel |
12 |
Group assails federal security proposals
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 698- 1 p. |
artikel |
13 |
5 H5a4BRTES7S
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 701- 1 p. |
artikel |
14 |
IFIP technical committee 11
|
|
|
1995 |
14 |
8 |
p. 739-741 3 p. |
artikel |
15 |
Industrial-strength security for the Internet
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 699- 1 p. |
artikel |
16 |
International Board of Referees
|
|
|
1995 |
14 |
8 |
p. 705-706 2 p. |
artikel |
17 |
Making the right connections
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 700- 1 p. |
artikel |
18 |
NT, Unix network security shapes up
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 697- 1 p. |
artikel |
19 |
Old viruses licked, but new ones find fodder in Windows 95
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 699- 1 p. |
artikel |
20 |
Operational insurance
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 700- 1 p. |
artikel |
21 |
PeopleSoft fixes password security flaw
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 697-698 2 p. |
artikel |
22 |
Present law will not stop the virus writers
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 697- 1 p. |
artikel |
23 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1995 |
14 |
8 |
p. 660-666 7 p. |
artikel |
24 |
Safe and secure
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 696- 1 p. |
artikel |
25 |
Safety on the move
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 698- 1 p. |
artikel |
26 |
Security overkill?
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 701- 1 p. |
artikel |
27 |
Security plans lag computer crime rate
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 699- 1 p. |
artikel |
28 |
Simplified sign-on brings enhanced security features
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 698- 1 p. |
artikel |
29 |
Striving for correctness
|
Abrams, Marshall D. |
|
1995 |
14 |
8 |
p. 719-738 20 p. |
artikel |
30 |
There are some cracks in the cornerstone of information security
|
Duncan, Rebecca J. |
|
1995 |
14 |
8 |
p. 675-680 6 p. |
artikel |
31 |
Virus wars escalate
|
Collinson, Helen |
|
1995 |
14 |
8 |
p. 696- 1 p. |
artikel |
32 |
Writing infosec policies
|
Wood, Charles Cresson |
|
1995 |
14 |
8 |
p. 667-674 8 p. |
artikel |