nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A baseline security policy for distributed healthcare information systems
|
Gritzalis, Dimitris |
|
1997 |
16 |
8 |
p. 709-719 11 p. |
artikel |
2 |
Area banks mount elaborate electronic defences
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 676- 1 p. |
artikel |
3 |
Bulletproof IP
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 679- 1 p. |
artikel |
4 |
Calendar
|
|
|
1997 |
16 |
8 |
p. 683-684 2 p. |
artikel |
5 |
Code breakers lured for crypto challenge
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 680- 1 p. |
artikel |
6 |
Concerns ease over Internet security
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 675- 1 p. |
artikel |
7 |
Dutch move to block French crypto laws
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 678- 1 p. |
artikel |
8 |
EDI security — re-evaluation of controls and its implications on the organizations
|
Ratnasingham, Pauline |
|
1997 |
16 |
8 |
p. 650-656 7 p. |
artikel |
9 |
Embedded systems: The other problem
|
Kemp, Alasdair |
|
1997 |
16 |
8 |
p. 663-668 6 p. |
artikel |
10 |
Encryption: hot topic on the Hill
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 678- 1 p. |
artikel |
11 |
Exorcising demons
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 676- 1 p. |
artikel |
12 |
Fighting computer viruses
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 676-677 2 p. |
artikel |
13 |
Former high-tech thief warns of scams
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 675- 1 p. |
artikel |
14 |
From the editor
|
|
|
1997 |
16 |
8 |
p. 648-649 2 p. |
artikel |
15 |
High-tech crime's hidden face
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 679- 1 p. |
artikel |
16 |
How to market yourself as an ISSO
|
Kovacich, Gerald |
|
1997 |
16 |
8 |
p. 657-662 6 p. |
artikel |
17 |
IFIP Technical Committee 11
|
|
|
1997 |
16 |
8 |
p. 721-723 3 p. |
artikel |
18 |
International board of referees
|
|
|
1997 |
16 |
8 |
p. 685-686 2 p. |
artikel |
19 |
Internet Rx: Should I be checking downloaded Java applets for viruses or other potential security violations?
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 677- 1 p. |
artikel |
20 |
Key recovery — why, how, who?
|
Clark, Andrew J. |
|
1997 |
16 |
8 |
p. 669-674 6 p. |
artikel |
21 |
Man accused of being UK's first Internet pirate
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 675- 1 p. |
artikel |
22 |
Microsoft battles with Russian pirates
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 676- 1 p. |
artikel |
23 |
Network security: safety is next
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 680-681 2 p. |
artikel |
24 |
OECD leader targets Internet security accords
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 679-680 2 p. |
artikel |
25 |
Paring password pileup
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 677- 1 p. |
artikel |
26 |
Portable protection
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 677- 1 p. |
artikel |
27 |
Protecting databases from inference attacks
|
Hinke, Thomas H. |
|
1997 |
16 |
8 |
p. 687-708 22 p. |
artikel |
28 |
Secure electronic-mail: return to sender
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 678-679 2 p. |
artikel |
29 |
Security gets easier, cheaper
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 680- 1 p. |
artikel |
30 |
Should only the paranoid get E-mail protection?
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 677- 1 p. |
artikel |
31 |
Stop, thief!
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 676- 1 p. |
artikel |
32 |
That ain't no standard spec
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 678- 1 p. |
artikel |
33 |
Trials and tribulations
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 680- 1 p. |
artikel |
34 |
Who goes there?
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 679- 1 p. |
artikel |
35 |
Wireless crime's inside story
|
McClure, Ben |
|
1997 |
16 |
8 |
p. 678- 1 p. |
artikel |