Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             74 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comparison between java and activeX security Hopwood, David
1997
16 6 p. 526-
1 p.
artikel
2 Addressing your information security skills shortages Pepper, Bill
1997
16 6 p. 522-523
2 p.
artikel
3 Advanced auditing: Selecting and testing the right controls Osborne, Keith
1997
16 6 p. 518-
1 p.
artikel
4 Auditing the IT security function Osborne, Keith
1997
16 6 p. 524-
1 p.
artikel
5 Bang goes your business Bacon, Michael
1997
16 6 p. 523-
1 p.
artikel
6 Blaming the victim Spafford, Eugene
1997
16 6 p. 527-
1 p.
artikel
7 Bridging the business-to-business authentication gap Meyer, Helen
1997
16 6 p. 512-
1 p.
artikel
8 Building Chinese walls in standard unixTM Foley, Simon N.
1997
16 6 p. 551-563
13 p.
artikel
9 Calendar 1997
16 6 p. 513-514
2 p.
artikel
10 COBIT — Audit guidance on effective implementation Pool, Vernon
1997
16 6 p. 518-
1 p.
artikel
11 Compsec '97 exhibitors 1997
16 6 p. 529-532
4 p.
artikel
12 Computer doctor busy fighting ‘viruses’ Meyer, Helen
1997
16 6 p. 511-
1 p.
artikel
13 Computer-related fraud and its evolution within telephony Mulhall, Tom
1997
16 6 p. 521-
1 p.
artikel
14 Contracting a macro virus whilst surfing the internet Aubrey-Jones, David
1997
16 6 p. 518-
1 p.
artikel
15 Creating a security culture Wilson, Heather
1997
16 6 p. 523-
1 p.
artikel
16 Electronic commerce — The way forward Dosdale, Terry
1997
16 6 p. 523-
1 p.
artikel
17 Embedded systems: The other problem Kemp, Alasdair
1997
16 6 p. 527-
1 p.
artikel
18 Encryption policy — a UK perspective Hickson, Nigel
1997
16 6 p. 516-
1 p.
artikel
19 E-signatures for the security conscious Meyer, Helen
1997
16 6 p. 509-510
2 p.
artikel
20 Essential controls for internet electronic commerce Wood, Charles Cresson
1997
16 6 p. 525-
1 p.
artikel
21 From the editor 1997
16 6 p. 452-453
2 p.
artikel
22 Future of Net cracked, flawed Meyer, Helen
1997
16 6 p. 509-
1 p.
artikel
23 Hackers blackmail Net businesses Meyer, Helen
1997
16 6 p. 508-
1 p.
artikel
24 Hacker tools can give IS a boost Meyer, Helen
1997
16 6 p. 509-
1 p.
artikel
25 Handle with care Meyer, Helen
1997
16 6 p. 510-
1 p.
artikel
26 House committee backs Clinton on encryption Meyer, Helen
1997
16 6 p. 508-509
2 p.
artikel
27 IFIP technical committee 11 1997
16 6 p. 565-567
3 p.
artikel
28 Improved system-access control using complementary technologies Labuschagne, L.
1997
16 6 p. 543-549
7 p.
artikel
29 Information flow within the globally connected environment Gordon, Sarah
1997
16 6 p. 525-
1 p.
artikel
30 Information security implemented in: The theory on stock market efficiency, Markowitz's portfolio theory and porter's value chain Finne, Thomas
1997
16 6 p. 469-479
11 p.
artikel
31 Information warfare and defending the UK nation state Corcoran, Michael J.
1997
16 6 p. 525-
1 p.
artikel
32 Infosec folk art and beyond Parker, Donn B.
1997
16 6 p. 515-
1 p.
artikel
33 Intelligent agents: New security issues Bailey, Steve
1997
16 6 p. 526-
1 p.
artikel
34 International Board of referees 1997
16 6 p. 541-542
2 p.
artikel
35 Internet E-mail security Wood, Peter
1997
16 6 p. 515-
1 p.
artikel
36 Internet encryption Docherty, Paul
1997
16 6 p. 518-
1 p.
artikel
37 In the line of fire Meyer, Helen
1997
16 6 p. 512-
1 p.
artikel
38 Intrusion detection and response Cohen, Fred
1997
16 6 p. 516-
1 p.
artikel
39 ISSO career development Gerald Kovacich, Dr.
1997
16 6 p. 455-458
4 p.
artikel
40 Is your Web site secure? Meyer, Helen
1997
16 6 p. 510-
1 p.
artikel
41 Key concerns in a review of CAACF2/MVS Crocker, Norman
1997
16 6 p. 524-
1 p.
artikel
42 Look back in wonder Amery, Chris
1997
16 6 p. 516-
1 p.
artikel
43 Managing security for outsourcing contracts Sherwood, John
1997
16 6 p. 523-
1 p.
artikel
44 MITI encryption-technology policy criticized Meyer, Helen
1997
16 6 p. 508-
1 p.
artikel
45 Novell gets $4 million in first fraud upgrade trial Meyer, Helen
1997
16 6 p. 507-508
2 p.
artikel
46 NT hackers warn of easy password interception Meyer, Helen
1997
16 6 p. 507-
1 p.
artikel
47 NT server security, audit and control Wood, Peter
1997
16 6 p. 523-524
2 p.
artikel
48 Pact promises simplified security Meyer, Helen
1997
16 6 p. 510-511
2 p.
artikel
49 PBX fraud, the final solution — Detection, deterrent, countermeasures Mulhall, Tom
1997
16 6 p. 521-
1 p.
artikel
50 Penetration testing Hardy, Gary
1997
16 6 p. 524-
1 p.
artikel
51 Penetration testing and system audit — Experience gained and lessons learned during the investigation of systems within the United Kingdom Jones, Andy
1997
16 6 p. 525-526
2 p.
artikel
52 Policies alone do not constitute a sufficient awareness effort Wood, Charles Cresson
1997
16 6 p. 522-
1 p.
artikel
53 Securing third party connections Schultz, Eugene
1997
16 6 p. 524-525
2 p.
artikel
54 Securing Windows NT in today's network environment Schultz, Eugene
1997
16 6 p. 521-522
2 p.
artikel
55 Shielding company data from internal threats Meyer, Helen
1997
16 6 p. 508-
1 p.
artikel
56 Smartcards — Is Britain getting smarter? Laird, Alan
1997
16 6 p. 526-
1 p.
artikel
57 Software AG extends mainframe security Meyer, Helen
1997
16 6 p. 510-
1 p.
artikel
58 Some observations on vulnerabilities Spafford, Eugene
1997
16 6 p. 515-
1 p.
artikel
59 Telecommunications fraud, the gory details Hoath, Peter
1997
16 6 p. 521-
1 p.
artikel
60 Telecoms systems insecurity, exploitation, fraud Meyer, Helen
1997
16 6 p. 511-512
2 p.
artikel
61 The cherished keys to the kingdom Meyer, Helen
1997
16 6 p. 511-
1 p.
artikel
62 The enemy everywhere Bacon, Michael
1997
16 6 p. 516-
1 p.
artikel
63 The importance of it security Parkin, Roderick
1997
16 6 p. 523-
1 p.
artikel
64 The internet — A legal quagmire Crichard, Mark
1997
16 6 p. 526-
1 p.
artikel
65 The spectrum of modern firewalls Nacht, Marius
1997
16 6 p. 516-
1 p.
artikel
66 The strategic value of information in business Parker, Donn B.
1997
16 6 p. 525-
1 p.
artikel
67 The year 2000 problem Joachim, Margaret
1997
16 6 p. 526-
1 p.
artikel
68 Two-phase cryptographic key recovery system Gennaro, Rosario
1997
16 6 p. 481-506
26 p.
artikel
69 Unix security Shehu, Suleiman
1997
16 6 p. 522-
1 p.
artikel
70 Update on the state of play in the hacker community Lindup, Ken
1997
16 6 p. 521-
1 p.
artikel
71 Update on triple DES operations and crypto system initialization Meyer, Carl
1997
16 6 p. 518-
1 p.
artikel
72 What are certification authorities and what are they liable for? Parker, Tom
1997
16 6 p. 516-
1 p.
artikel
73 Windows NT security today and the future Birch, Peter
1997
16 6 p. 521-
1 p.
artikel
74 20 years of DES — How it was designed Meyer, Carl
1997
16 6 p. 518-
1 p.
artikel
                             74 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland