nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A new and nasty way to flood networks with spam
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 622-623 2 p. |
artikel |
2 |
Backdoor closes, for now, on crypto plan
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 619- 1 p. |
artikel |
3 |
Calendar
|
|
|
1997 |
16 |
7 |
p. 625-626 2 p. |
artikel |
4 |
Cognitive, associative and conventional passwords: Recall and guessing rates
|
Bunnell, Julie |
|
1997 |
16 |
7 |
p. 629-641 13 p. |
artikel |
5 |
Detecting network intruders
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 622- 1 p. |
artikel |
6 |
Encryption policy — A UK perspective
|
Hickson, Nigel |
|
1997 |
16 |
7 |
p. 583-589 7 p. |
artikel |
7 |
First steps towards a european union policy on the securing of electronic communications
|
Pounder, Chris |
|
1997 |
16 |
7 |
p. 590-594 5 p. |
artikel |
8 |
From the editor
|
|
|
1997 |
16 |
7 |
p. 570-571 2 p. |
artikel |
9 |
IFip technical committee 11
|
|
|
1997 |
16 |
7 |
p. 643-645 3 p. |
artikel |
10 |
Information systems security metrics management
|
Kovacich, Gerald |
|
1997 |
16 |
7 |
p. 610-618 9 p. |
artikel |
11 |
International board of referees
|
|
|
1997 |
16 |
7 |
p. 627-628 2 p. |
artikel |
12 |
ISS unveils 4-step security program
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 620- 1 p. |
artikel |
13 |
Low-overhead cryptography
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 621- 1 p. |
artikel |
14 |
Managing security for outsourcing contracts
|
Sherwood, John |
|
1997 |
16 |
7 |
p. 603-609 7 p. |
artikel |
15 |
Monitoring as you like it
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 623- 1 p. |
artikel |
16 |
New twists on secure VPNS
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 619-620 2 p. |
artikel |
17 |
Penetration testing and system audit — experience gained during the investigation of systems within the UK
|
Jones, Andy |
|
1997 |
16 |
7 |
p. 595-602 8 p. |
artikel |
18 |
PKI provides a base for secure transactions
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 620-621 2 p. |
artikel |
19 |
Privacy better than ‘Pretty Good’
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 620- 1 p. |
artikel |
20 |
Secure electronic-mail: return to sender
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 624- 1 p. |
artikel |
21 |
Securing your users' Web browsers
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 619- 1 p. |
artikel |
22 |
Self-mutating Word viruses create strain
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 621-622 2 p. |
artikel |
23 |
Servers to spam: drop dead
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 623- 1 p. |
artikel |
24 |
Smartcards: world access
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 623- 1 p. |
artikel |
25 |
Software could spoof-proof domain names
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 621- 1 p. |
artikel |
26 |
The strategic values of information security in business
|
Parker, Donn B. |
|
1997 |
16 |
7 |
p. 572-582 11 p. |
artikel |
27 |
Unlocking virtual private networks
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 624- 1 p. |
artikel |
28 |
User authentication, VPN in an appliance
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 621- 1 p. |
artikel |
29 |
VPNS: security with an uncommon touch
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 624- 1 p. |
artikel |
30 |
WorldSecure Server combats E-mail plagues
|
Meyer, Helen |
|
1997 |
16 |
7 |
p. 620- 1 p. |
artikel |