nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A history of firewall technology
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 331- 1 p. |
artikel |
2 |
A management view of internet electronic commerce security
|
Wood, Charles Cresson |
|
1997 |
16 |
4 |
p. 316-320 5 p. |
artikel |
3 |
A new era in cryptography
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 329- 1 p. |
artikel |
4 |
Averting disaster
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 332- 1 p. |
artikel |
5 |
Bugs in the web
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 332-333 2 p. |
artikel |
6 |
Calendar
|
|
|
1997 |
16 |
4 |
p. 335-336 2 p. |
artikel |
7 |
Certificates still being tuned
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 333- 1 p. |
artikel |
8 |
Cleansing your computer's palate
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 333- 1 p. |
artikel |
9 |
Crypt keeper
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 330- 1 p. |
artikel |
10 |
Four steps to security
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 330- 1 p. |
artikel |
11 |
From the editor
|
|
|
1997 |
16 |
4 |
p. 264-265 2 p. |
artikel |
12 |
IFIP TC 11 news
|
Highland, Harold Joseph |
|
1997 |
16 |
4 |
p. 327-328 2 p. |
artikel |
13 |
IFIP technical committee 11
|
|
|
1997 |
16 |
4 |
p. 345-347 3 p. |
artikel |
14 |
International Board of referees
|
|
|
1997 |
16 |
4 |
p. 337-338 2 p. |
artikel |
15 |
Internet armour
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 331-332 2 p. |
artikel |
16 |
Legal peril on the web
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 330-331 2 p. |
artikel |
17 |
Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication
|
Chih-Hung, Wang |
|
1997 |
16 |
4 |
p. 339-344 6 p. |
artikel |
18 |
New age of encryption
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 329-330 2 p. |
artikel |
19 |
No peeking: can web users thwart snoops?
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 329- 1 p. |
artikel |
20 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1997 |
16 |
4 |
p. 266-275 10 p. |
artikel |
21 |
Scrambling e-mail on a server
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 331- 1 p. |
artikel |
22 |
Securing intranet data with SSL client certificates
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 334- 1 p. |
artikel |
23 |
The big macro attack
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 334- 1 p. |
artikel |
24 |
The ISSO must understand the business and management environment
|
Kovacich, Gerald |
|
1997 |
16 |
4 |
p. 321-326 6 p. |
artikel |
25 |
TIS, microsoft security initiative
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 330- 1 p. |
artikel |
26 |
Watch out for the threat of e-mail viruses
|
Meyer, Helen |
|
1997 |
16 |
4 |
p. 332- 1 p. |
artikel |
27 |
Where have all the hackers gone?
|
Mulhall, Tom |
|
1997 |
16 |
4 |
p. 291-297 7 p. |
artikel |
28 |
Where have all the hackers gone?
|
Mulhall, Tom |
|
1997 |
16 |
4 |
p. 298-303 6 p. |
artikel |
29 |
Where have all the hackers gone?
|
Mulhall, Tom |
|
1997 |
16 |
4 |
p. 304-306 3 p. |
artikel |
30 |
Where have all the hackers gone?
|
Mulhall, Tom |
|
1997 |
16 |
4 |
p. 285-290 6 p. |
artikel |
31 |
Where have all the hackers gone?
|
Mulhall, Tom |
|
1997 |
16 |
4 |
p. 307-315 9 p. |
artikel |
32 |
Where have all the hackers gone? A study in motivation, deterrence, and crime displacement
|
Mulhall, Tom |
|
1997 |
16 |
4 |
p. 277-284 8 p. |
artikel |