nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A business approach to effective information technology risk analysis and management
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 321- 1 p. |
artikel |
2 |
A collision-free secret ballot protocol for computerized general elections
|
Juang, Wen-Shenq |
|
1996 |
15 |
4 |
p. 339-348 10 p. |
artikel |
3 |
A computer emergency response team policy
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 320- 1 p. |
artikel |
4 |
An implementable secure voting scheme
|
Borrell, Joan |
|
1996 |
15 |
4 |
p. 327-338 12 p. |
artikel |
5 |
A proposed mode for triple-DES encryption
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 322- 1 p. |
artikel |
6 |
Calender
|
|
|
1996 |
15 |
4 |
p. 323-324 2 p. |
artikel |
7 |
Commercial security on the Internet
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 321- 1 p. |
artikel |
8 |
Constructing difficult-to-guess passwords
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 321- 1 p. |
artikel |
9 |
Data security report
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 320- 1 p. |
artikel |
10 |
Fear and loathing on the World Wide Web
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 319- 1 p. |
artikel |
11 |
From the editor
|
|
|
1996 |
15 |
4 |
p. 268-269 2 p. |
artikel |
12 |
Hazards of hooking up
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 321- 1 p. |
artikel |
13 |
How safe is your LAN?
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 321- 1 p. |
artikel |
14 |
IFIP technical committee 11
|
|
|
1996 |
15 |
4 |
p. 349-351 3 p. |
artikel |
15 |
Information security in business environments
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 321-322 2 p. |
artikel |
16 |
Information security management: The second generation
|
von Solms, Rossouw |
|
1996 |
15 |
4 |
p. 281-288 8 p. |
artikel |
17 |
Inner security
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 319-320 2 p. |
artikel |
18 |
International board of referees
|
|
|
1996 |
15 |
4 |
p. 325-326 2 p. |
artikel |
19 |
Internet security: how much is enough?
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 322- 1 p. |
artikel |
20 |
In the 'net shall we trust
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 318- 1 p. |
artikel |
21 |
Mobile secure telephones
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 320- 1 p. |
artikel |
22 |
Net server to secure smaller offices
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 318- 1 p. |
artikel |
23 |
Protecting your link to the Net
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 321- 1 p. |
artikel |
24 |
Protection on the web
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 319- 1 p. |
artikel |
25 |
Providing security for Unix networks
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 320- 1 p. |
artikel |
26 |
Pstt! Security designed for your eyes only
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 317-318 2 p. |
artikel |
27 |
Puffer 2.0 buys you some e-mail security via easy encryption
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 318-319 2 p. |
artikel |
28 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1996 |
15 |
4 |
p. 270-280 11 p. |
artikel |
29 |
Security issues lurk behind bank doors
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 319- 1 p. |
artikel |
30 |
Security risk or security solution?
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 317- 1 p. |
artikel |
31 |
Servers get single sign-on
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 318- 1 p. |
artikel |
32 |
Teleworking: threats, risks and solutions
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 320- 1 p. |
artikel |
33 |
The information security chain in a company
|
Finne, Thomas |
|
1996 |
15 |
4 |
p. 297-316 20 p. |
artikel |
34 |
Tough firewalls help users avoid getting burned
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 320- 1 p. |
artikel |
35 |
Using RAD tools to develop secure client/server applications
|
Lemieux, Jacques R. |
|
1996 |
15 |
4 |
p. 289-295 7 p. |
artikel |
36 |
Web developers face security quandary
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 317- 1 p. |
artikel |
37 |
White House launches cybershield
|
Meyer, Helen |
|
1996 |
15 |
4 |
p. 318- 1 p. |
artikel |