nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Antivirus firewalls
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 586- 1 p. |
artikel |
2 |
Calender
|
|
|
1996 |
15 |
7 |
p. 591-592 2 p. |
artikel |
3 |
Cheyenne, McAfee cure software viruses
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 587-588 2 p. |
artikel |
4 |
Computer hackers turn to pager systems
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 585-586 2 p. |
artikel |
5 |
Computer viruses: myth vs reality
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 585- 1 p. |
artikel |
6 |
Controlling access
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 588- 1 p. |
artikel |
7 |
Cryptographic controls — the eternal triangle
|
Clark, Andrew J |
|
1996 |
15 |
7 |
p. 576-584 9 p. |
artikel |
8 |
Denial of service, the future of dirty tricks
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 586- 1 p. |
artikel |
9 |
From the editor
|
|
|
1996 |
15 |
7 |
p. 550-551 2 p. |
artikel |
10 |
Getting real about virtual private data nets
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 588-589 2 p. |
artikel |
11 |
GSSP (Generally-Accepted System Security Principles): A trip to Abilene?
|
Krull, Alan R. |
|
1996 |
15 |
7 |
p. 567-575 9 p. |
artikel |
12 |
How to protect your data
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 586-587 2 p. |
artikel |
13 |
IFIP technical committee 11rch in Computer Security
|
|
|
1996 |
15 |
7 |
p. 647-649 3 p. |
artikel |
14 |
Information warfare — Your company needs you!
|
Porter, Tim |
|
1996 |
15 |
7 |
p. 561-566 6 p. |
artikel |
15 |
International board of referees
|
|
|
1996 |
15 |
7 |
p. 593-594 2 p. |
artikel |
16 |
Making internet access safe
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 587- 1 p. |
artikel |
17 |
Making the internet safe for e-commerce
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 587- 1 p. |
artikel |
18 |
Message encipherment with minimal expansion and redundancy—doing better than ISO-10126
|
Jansen, Cees J.A. |
|
1996 |
15 |
7 |
p. 627-632 6 p. |
artikel |
19 |
Possible macro virus attacks and how to prevent them
|
Bontchev, Vesselin |
|
1996 |
15 |
7 |
p. 595-626 32 p. |
artikel |
20 |
Quantitative authentication and vouching
|
Yesberg, John D. |
|
1996 |
15 |
7 |
p. 633-645 13 p. |
artikel |
21 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1996 |
15 |
7 |
p. 552-560 9 p. |
artikel |
22 |
Secure your Mac
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 590- 1 p. |
artikel |
23 |
Strategic security for IP networks
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 590- 1 p. |
artikel |
24 |
Striking just the right firewall match
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 589- 1 p. |
artikel |
25 |
The new US encryption policy
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 585- 1 p. |
artikel |
26 |
Tips for safeguarding your digital assets
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 588- 1 p. |
artikel |
27 |
Viruses: sucker bait
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 589-590 2 p. |
artikel |
28 |
Web server: security lockdown
|
Meyer, Helen |
|
1996 |
15 |
7 |
p. 589- 1 p. |
artikel |