nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparison between java and activeX security
|
Hopwood, David |
|
1997 |
16 |
6 |
p. 526- 1 p. |
artikel |
2 |
Addressing your information security skills shortages
|
Pepper, Bill |
|
1997 |
16 |
6 |
p. 522-523 2 p. |
artikel |
3 |
Advanced auditing: Selecting and testing the right controls
|
Osborne, Keith |
|
1997 |
16 |
6 |
p. 518- 1 p. |
artikel |
4 |
Auditing the IT security function
|
Osborne, Keith |
|
1997 |
16 |
6 |
p. 524- 1 p. |
artikel |
5 |
Bang goes your business
|
Bacon, Michael |
|
1997 |
16 |
6 |
p. 523- 1 p. |
artikel |
6 |
Blaming the victim
|
Spafford, Eugene |
|
1997 |
16 |
6 |
p. 527- 1 p. |
artikel |
7 |
Bridging the business-to-business authentication gap
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 512- 1 p. |
artikel |
8 |
Building Chinese walls in standard unixTM
|
Foley, Simon N. |
|
1997 |
16 |
6 |
p. 551-563 13 p. |
artikel |
9 |
Calendar
|
|
|
1997 |
16 |
6 |
p. 513-514 2 p. |
artikel |
10 |
COBIT — Audit guidance on effective implementation
|
Pool, Vernon |
|
1997 |
16 |
6 |
p. 518- 1 p. |
artikel |
11 |
Compsec '97 exhibitors
|
|
|
1997 |
16 |
6 |
p. 529-532 4 p. |
artikel |
12 |
Computer doctor busy fighting ‘viruses’
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 511- 1 p. |
artikel |
13 |
Computer-related fraud and its evolution within telephony
|
Mulhall, Tom |
|
1997 |
16 |
6 |
p. 521- 1 p. |
artikel |
14 |
Contracting a macro virus whilst surfing the internet
|
Aubrey-Jones, David |
|
1997 |
16 |
6 |
p. 518- 1 p. |
artikel |
15 |
Creating a security culture
|
Wilson, Heather |
|
1997 |
16 |
6 |
p. 523- 1 p. |
artikel |
16 |
Electronic commerce — The way forward
|
Dosdale, Terry |
|
1997 |
16 |
6 |
p. 523- 1 p. |
artikel |
17 |
Embedded systems: The other problem
|
Kemp, Alasdair |
|
1997 |
16 |
6 |
p. 527- 1 p. |
artikel |
18 |
Encryption policy — a UK perspective
|
Hickson, Nigel |
|
1997 |
16 |
6 |
p. 516- 1 p. |
artikel |
19 |
E-signatures for the security conscious
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 509-510 2 p. |
artikel |
20 |
Essential controls for internet electronic commerce
|
Wood, Charles Cresson |
|
1997 |
16 |
6 |
p. 525- 1 p. |
artikel |
21 |
From the editor
|
|
|
1997 |
16 |
6 |
p. 452-453 2 p. |
artikel |
22 |
Future of Net cracked, flawed
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 509- 1 p. |
artikel |
23 |
Hackers blackmail Net businesses
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 508- 1 p. |
artikel |
24 |
Hacker tools can give IS a boost
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 509- 1 p. |
artikel |
25 |
Handle with care
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 510- 1 p. |
artikel |
26 |
House committee backs Clinton on encryption
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 508-509 2 p. |
artikel |
27 |
IFIP technical committee 11
|
|
|
1997 |
16 |
6 |
p. 565-567 3 p. |
artikel |
28 |
Improved system-access control using complementary technologies
|
Labuschagne, L. |
|
1997 |
16 |
6 |
p. 543-549 7 p. |
artikel |
29 |
Information flow within the globally connected environment
|
Gordon, Sarah |
|
1997 |
16 |
6 |
p. 525- 1 p. |
artikel |
30 |
Information security implemented in: The theory on stock market efficiency, Markowitz's portfolio theory and porter's value chain
|
Finne, Thomas |
|
1997 |
16 |
6 |
p. 469-479 11 p. |
artikel |
31 |
Information warfare and defending the UK nation state
|
Corcoran, Michael J. |
|
1997 |
16 |
6 |
p. 525- 1 p. |
artikel |
32 |
Infosec folk art and beyond
|
Parker, Donn B. |
|
1997 |
16 |
6 |
p. 515- 1 p. |
artikel |
33 |
Intelligent agents: New security issues
|
Bailey, Steve |
|
1997 |
16 |
6 |
p. 526- 1 p. |
artikel |
34 |
International Board of referees
|
|
|
1997 |
16 |
6 |
p. 541-542 2 p. |
artikel |
35 |
Internet E-mail security
|
Wood, Peter |
|
1997 |
16 |
6 |
p. 515- 1 p. |
artikel |
36 |
Internet encryption
|
Docherty, Paul |
|
1997 |
16 |
6 |
p. 518- 1 p. |
artikel |
37 |
In the line of fire
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 512- 1 p. |
artikel |
38 |
Intrusion detection and response
|
Cohen, Fred |
|
1997 |
16 |
6 |
p. 516- 1 p. |
artikel |
39 |
ISSO career development
|
Gerald Kovacich, Dr. |
|
1997 |
16 |
6 |
p. 455-458 4 p. |
artikel |
40 |
Is your Web site secure?
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 510- 1 p. |
artikel |
41 |
Key concerns in a review of CAACF2/MVS
|
Crocker, Norman |
|
1997 |
16 |
6 |
p. 524- 1 p. |
artikel |
42 |
Look back in wonder
|
Amery, Chris |
|
1997 |
16 |
6 |
p. 516- 1 p. |
artikel |
43 |
Managing security for outsourcing contracts
|
Sherwood, John |
|
1997 |
16 |
6 |
p. 523- 1 p. |
artikel |
44 |
MITI encryption-technology policy criticized
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 508- 1 p. |
artikel |
45 |
Novell gets $4 million in first fraud upgrade trial
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 507-508 2 p. |
artikel |
46 |
NT hackers warn of easy password interception
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 507- 1 p. |
artikel |
47 |
NT server security, audit and control
|
Wood, Peter |
|
1997 |
16 |
6 |
p. 523-524 2 p. |
artikel |
48 |
Pact promises simplified security
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 510-511 2 p. |
artikel |
49 |
PBX fraud, the final solution — Detection, deterrent, countermeasures
|
Mulhall, Tom |
|
1997 |
16 |
6 |
p. 521- 1 p. |
artikel |
50 |
Penetration testing
|
Hardy, Gary |
|
1997 |
16 |
6 |
p. 524- 1 p. |
artikel |
51 |
Penetration testing and system audit — Experience gained and lessons learned during the investigation of systems within the United Kingdom
|
Jones, Andy |
|
1997 |
16 |
6 |
p. 525-526 2 p. |
artikel |
52 |
Policies alone do not constitute a sufficient awareness effort
|
Wood, Charles Cresson |
|
1997 |
16 |
6 |
p. 522- 1 p. |
artikel |
53 |
Securing third party connections
|
Schultz, Eugene |
|
1997 |
16 |
6 |
p. 524-525 2 p. |
artikel |
54 |
Securing Windows NT in today's network environment
|
Schultz, Eugene |
|
1997 |
16 |
6 |
p. 521-522 2 p. |
artikel |
55 |
Shielding company data from internal threats
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 508- 1 p. |
artikel |
56 |
Smartcards — Is Britain getting smarter?
|
Laird, Alan |
|
1997 |
16 |
6 |
p. 526- 1 p. |
artikel |
57 |
Software AG extends mainframe security
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 510- 1 p. |
artikel |
58 |
Some observations on vulnerabilities
|
Spafford, Eugene |
|
1997 |
16 |
6 |
p. 515- 1 p. |
artikel |
59 |
Telecommunications fraud, the gory details
|
Hoath, Peter |
|
1997 |
16 |
6 |
p. 521- 1 p. |
artikel |
60 |
Telecoms systems insecurity, exploitation, fraud
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 511-512 2 p. |
artikel |
61 |
The cherished keys to the kingdom
|
Meyer, Helen |
|
1997 |
16 |
6 |
p. 511- 1 p. |
artikel |
62 |
The enemy everywhere
|
Bacon, Michael |
|
1997 |
16 |
6 |
p. 516- 1 p. |
artikel |
63 |
The importance of it security
|
Parkin, Roderick |
|
1997 |
16 |
6 |
p. 523- 1 p. |
artikel |
64 |
The internet — A legal quagmire
|
Crichard, Mark |
|
1997 |
16 |
6 |
p. 526- 1 p. |
artikel |
65 |
The spectrum of modern firewalls
|
Nacht, Marius |
|
1997 |
16 |
6 |
p. 516- 1 p. |
artikel |
66 |
The strategic value of information in business
|
Parker, Donn B. |
|
1997 |
16 |
6 |
p. 525- 1 p. |
artikel |
67 |
The year 2000 problem
|
Joachim, Margaret |
|
1997 |
16 |
6 |
p. 526- 1 p. |
artikel |
68 |
Two-phase cryptographic key recovery system
|
Gennaro, Rosario |
|
1997 |
16 |
6 |
p. 481-506 26 p. |
artikel |
69 |
Unix security
|
Shehu, Suleiman |
|
1997 |
16 |
6 |
p. 522- 1 p. |
artikel |
70 |
Update on the state of play in the hacker community
|
Lindup, Ken |
|
1997 |
16 |
6 |
p. 521- 1 p. |
artikel |
71 |
Update on triple DES operations and crypto system initialization
|
Meyer, Carl |
|
1997 |
16 |
6 |
p. 518- 1 p. |
artikel |
72 |
What are certification authorities and what are they liable for?
|
Parker, Tom |
|
1997 |
16 |
6 |
p. 516- 1 p. |
artikel |
73 |
Windows NT security today and the future
|
Birch, Peter |
|
1997 |
16 |
6 |
p. 521- 1 p. |
artikel |
74 |
20 years of DES — How it was designed
|
Meyer, Carl |
|
1997 |
16 |
6 |
p. 518- 1 p. |
artikel |