nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Attack highlights Web security risks
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 517- 1 p. |
artikel |
2 |
Calender
|
|
|
1996 |
15 |
6 |
p. 521-522 2 p. |
artikel |
3 |
Cope with disaster
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 519- 1 p. |
artikel |
4 |
Cryptanalysis and repair of the multi-verifier signature with verifier specification
|
Yen, Sung-Ming |
|
1996 |
15 |
6 |
p. 537-544 8 p. |
artikel |
5 |
Establishing a network security programme
|
Kovacich, Gerald L. |
|
1996 |
15 |
6 |
p. 486-498 13 p. |
artikel |
6 |
Extending the schematic protection model—II. Revocation
|
Varadharajan, Vijay |
|
1996 |
15 |
6 |
p. 525-536 12 p. |
artikel |
7 |
Feeling more secure about intranets
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 516-517 2 p. |
artikel |
8 |
Firewall fights intranet threat
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 519- 1 p. |
artikel |
9 |
Firm turns China piracy into contract
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 515- 1 p. |
artikel |
10 |
From the editor
|
|
|
1996 |
15 |
6 |
p. 456-457 2 p. |
artikel |
11 |
Getting personal on the net
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 517- 1 p. |
artikel |
12 |
Hacker with a cause?
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 518- 1 p. |
artikel |
13 |
IFIP technical committee 11
|
|
|
1996 |
15 |
6 |
p. 545-547 3 p. |
artikel |
14 |
International board of referees
|
|
|
1996 |
15 |
6 |
p. 523-524 2 p. |
artikel |
15 |
Internet poses risk, CIBC head says
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 516- 1 p. |
artikel |
16 |
Managers get third access security spec
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 520- 1 p. |
artikel |
17 |
Object oriented cryptographic facility design: Export considerations
|
Press, Jim |
|
1996 |
15 |
6 |
p. 507-514 8 p. |
artikel |
18 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1996 |
15 |
6 |
p. 458-469 12 p. |
artikel |
19 |
SALSA: A method for developing the enterprise security architecture and strategy
|
Sherwood, John |
|
1996 |
15 |
6 |
p. 501-506 6 p. |
artikel |
20 |
Seattle software's firewall keeps watch
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 517- 1 p. |
artikel |
21 |
Security blanket
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 518- 1 p. |
artikel |
22 |
Security for cellular phones on the way
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 515- 1 p. |
artikel |
23 |
Security gap uncovered in ActiveX components
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 516- 1 p. |
artikel |
24 |
Security issues in the virtual corporation
|
(Bob) Frank, Robert L. |
|
1996 |
15 |
6 |
p. 471-476 6 p. |
artikel |
25 |
Selling security
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 519- 1 p. |
artikel |
26 |
The I-team
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 519-520 2 p. |
artikel |
27 |
The role of information security in corporate governance
|
Lindup, Ken |
|
1996 |
15 |
6 |
p. 477-485 9 p. |
artikel |
28 |
Under lock and key
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 517-518 2 p. |
artikel |
29 |
US assailed on plans for encryption export
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 515- 1 p. |
artikel |
30 |
Users fall short on 'net security planning
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 518-519 2 p. |
artikel |
31 |
Web security is key to HP's 'net strategy
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 516- 1 p. |
artikel |
32 |
Windows NT to gain built-in security
|
Meyer, Helen |
|
1996 |
15 |
6 |
p. 516- 1 p. |
artikel |
33 |
Year 2000 — A real is security issue
|
Heinlein, Edwin B. |
|
1996 |
15 |
6 |
p. 499-500 2 p. |
artikel |