nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A secure world-wide-web daemon
|
Cohen, Frederick B. |
|
1996 |
15 |
8 |
p. 707-724 18 p. |
artikel |
2 |
A security officer's workbench
|
Kwok, Lam For |
|
1996 |
15 |
8 |
p. 695-705 11 p. |
artikel |
3 |
Beware the Word macro virus
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 689-690 2 p. |
artikel |
4 |
Calender
|
|
|
1996 |
15 |
8 |
p. 691-692 2 p. |
artikel |
5 |
Corporates blasé over software theft
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 685- 1 p. |
artikel |
6 |
Curing your NT security headache
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 689- 1 p. |
artikel |
7 |
Cybercop takes on network snoops
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 685- 1 p. |
artikel |
8 |
Developers can control Java access with firewall
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 688- 1 p. |
artikel |
9 |
Developers worried about safety of Java and ActiveX
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 687- 1 p. |
artikel |
10 |
Firestorm over firewalls
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 689- 1 p. |
artikel |
11 |
From the editor
|
|
|
1996 |
15 |
8 |
p. 652-653 2 p. |
artikel |
12 |
GOST 34.10—A brief overview of Russia's DSA
|
Michels, Markus |
|
1996 |
15 |
8 |
p. 725-732 8 p. |
artikel |
13 |
IFIP Technical Committee 11
|
|
|
1996 |
15 |
8 |
p. 733-735 3 p. |
artikel |
14 |
International board of referees
|
|
|
1996 |
15 |
8 |
p. 693-694 2 p. |
artikel |
15 |
Internet users sued for software piracy
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 688- 1 p. |
artikel |
16 |
Internet/web directory
|
Highland, Harold Joseph |
|
1996 |
15 |
8 |
p. 656-657 2 p. |
artikel |
17 |
InterScan E-Mail Viruswall 1.5
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 686- 1 p. |
artikel |
18 |
Intranet firewalls offer no protection against the enemy within
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 688-689 2 p. |
artikel |
19 |
It's a web browser! No, it's a weapon!
|
Highland, Harold Joseph |
|
1996 |
15 |
8 |
p. 655-656 2 p. |
artikel |
20 |
Laroux macro virus strain hits Excel
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 686- 1 p. |
artikel |
21 |
MOD tooled up on security issue
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 685-686 2 p. |
artikel |
22 |
More secure electronic payment
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 689- 1 p. |
artikel |
23 |
Ntis volumes of interest
|
Highland, Harold Joseph |
|
1996 |
15 |
8 |
p. 658-660 3 p. |
artikel |
24 |
Online sales pose security concerns
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 687- 1 p. |
artikel |
25 |
Open for business—Securely!
|
Adams, Dean |
|
1996 |
15 |
8 |
p. 673-682 10 p. |
artikel |
26 |
Passwords, the web, and the internet
|
Highland, Harold Joseph |
|
1996 |
15 |
8 |
p. 654- 1 p. |
artikel |
27 |
Photon protection
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 687- 1 p. |
artikel |
28 |
Plugging the holes in host-based authentication
|
Reid, Jim |
|
1996 |
15 |
8 |
p. 661-671 11 p. |
artikel |
29 |
Police ruling reveals CMA weakness
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 686- 1 p. |
artikel |
30 |
Pornography and privacy
|
Highland, Harold Joseph |
|
1996 |
15 |
8 |
p. 654-655 2 p. |
artikel |
31 |
Privacy issues stir online passions
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 687-688 2 p. |
artikel |
32 |
Shoot-out at the IP corral
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 690- 1 p. |
artikel |
33 |
Telephone fraud poses threat to UK business
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 686-687 2 p. |
artikel |
34 |
Terrorism bill pits safety vs. privacy
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 687- 1 p. |
artikel |
35 |
The enemy within
|
Highland, Harold Joseph |
|
1996 |
15 |
8 |
p. 657- 1 p. |
artikel |
36 |
Transarc addresses'net security concerns
|
Meyer, Helen |
|
1996 |
15 |
8 |
p. 688- 1 p. |
artikel |