nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A digital signature scheme based upon the theory of quadratic residues
|
|
|
1997 |
16 |
1 |
p. 66- 1 p. |
artikel |
2 |
A new browser could let others tap into your bank account
|
|
|
1997 |
16 |
1 |
p. 61- 1 p. |
artikel |
3 |
Between the cracks
|
|
|
1997 |
16 |
1 |
p. 64-65 2 p. |
artikel |
4 |
Calender
|
|
|
1997 |
16 |
1 |
p. 67-68 2 p. |
artikel |
5 |
Cryptography: a key to growth — and crime
|
|
|
1997 |
16 |
1 |
p. 62- 1 p. |
artikel |
6 |
Current literature The 19th National Information Systems Security Conference
|
Highland, Harold Joseph |
|
1997 |
16 |
1 |
p. 47-59 13 p. |
artikel |
7 |
Cyberclash over cybercash
|
|
|
1997 |
16 |
1 |
p. 62-63 2 p. |
artikel |
8 |
Cyber extortion — The corporate response
|
Boyce, Brian |
|
1997 |
16 |
1 |
p. 25-28 4 p. |
artikel |
9 |
Editorial Board
|
|
|
1997 |
16 |
1 |
p. 2- 1 p. |
artikel |
10 |
Fortifyingyour firewall
|
|
|
1997 |
16 |
1 |
p. 66- 1 p. |
artikel |
11 |
From the editor
|
Meyer, John |
|
1997 |
16 |
1 |
p. 2-3 2 p. |
artikel |
12 |
Gotcha! Con games on the Internet
|
|
|
1997 |
16 |
1 |
p. 63- 1 p. |
artikel |
13 |
Holding the fort
|
|
|
1997 |
16 |
1 |
p. 65- 1 p. |
artikel |
14 |
How digital certificates work
|
|
|
1997 |
16 |
1 |
p. 62- 1 p. |
artikel |
15 |
IFIP Technical Committee 11
|
|
|
1997 |
16 |
1 |
p. 80-82 3 p. |
artikel |
16 |
Information system attacks: A preliminary classification scheme
|
Cohen, Fred |
|
1997 |
16 |
1 |
p. 29-46 18 p. |
artikel |
17 |
Information warfare and the information systems security professional
|
Kovacich, Gerald L. |
|
1997 |
16 |
1 |
p. 14-24 11 p. |
artikel |
18 |
Internal firewalls protect against inside jobs
|
|
|
1997 |
16 |
1 |
p. 64- 1 p. |
artikel |
19 |
International Board of Referees
|
|
|
1997 |
16 |
1 |
p. 69-70 2 p. |
artikel |
20 |
It's 1997. Do you know where your data is?
|
|
|
1997 |
16 |
1 |
p. 64- 1 p. |
artikel |
21 |
Online security is Swiss cheese, a survey finds
|
|
|
1997 |
16 |
1 |
p. 62- 1 p. |
artikel |
22 |
Random bits & bytes & bytes
|
Highland, Harold Joseph |
|
1997 |
16 |
1 |
p. 4-13 10 p. |
artikel |
23 |
Screening for applets
|
|
|
1997 |
16 |
1 |
p. 65- 1 p. |
artikel |
24 |
SecureDesktop protects your PC like a vault
|
|
|
1997 |
16 |
1 |
p. 65- 1 p. |
artikel |
25 |
Stop viruses before they replicate
|
|
|
1997 |
16 |
1 |
p. 63-64 2 p. |
artikel |
26 |
System intrusion processes: a simulation model
|
Soh, B.C. |
|
1997 |
16 |
1 |
p. 71-79 9 p. |
artikel |
27 |
Tools keep Web surfing safe
|
|
|
1997 |
16 |
1 |
p. 63- 1 p. |
artikel |
28 |
Virus killers
|
|
|
1997 |
16 |
1 |
p. 66- 1 p. |
artikel |
29 |
Web hack attacks bring down servers, but businesses stay
|
|
|
1997 |
16 |
1 |
p. 61- 1 p. |
artikel |
30 |
Web security: how much is enough?
|
|
|
1997 |
16 |
1 |
p. 65-66 2 p. |
artikel |
31 |
When encryption slows you down
|
|
|
1997 |
16 |
1 |
p. 61- 1 p. |
artikel |