nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A new virus threat?
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 59- 1 p. |
artikel |
2 |
Anti-virus belongs under the rug
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 59-60 2 p. |
artikel |
3 |
Auditing the IT security function
|
Osborne, Keith |
|
1998 |
17 |
1 |
p. 34-41 8 p. |
artikel |
4 |
Aventail secures VPNs down to the client
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 58- 1 p. |
artikel |
5 |
Bulletproof IP
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 62- 1 p. |
artikel |
6 |
Calendar
|
|
|
1998 |
17 |
1 |
p. 65-66 2 p. |
artikel |
7 |
Digital signatures shouldn't enter the encryption debate
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 57- 1 p. |
artikel |
8 |
Do you need an intranet firewall?
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 61- 1 p. |
artikel |
9 |
Editorial Board
|
|
|
1998 |
17 |
1 |
p. 2- 1 p. |
artikel |
10 |
E-mail getting a scan from server
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 61- 1 p. |
artikel |
11 |
eSafe ups ante for Java, security
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 57- 1 p. |
artikel |
12 |
From the editor
|
Hancock, Bill |
|
1998 |
17 |
1 |
p. 2-4 3 p. |
artikel |
13 |
GSSP preface/overview
|
Ozier, Will |
|
1998 |
17 |
1 |
p. 14-18 5 p. |
artikel |
14 |
Hacker nabbed for web antics
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 59- 1 p. |
artikel |
15 |
High-tech security and the failings of president clinton's commission on critical infrastructure protection
|
Bequai, August |
|
1998 |
17 |
1 |
p. 19-21 3 p. |
artikel |
16 |
Homeworking: No longer an easy option?
|
Pounder, Chris |
|
1998 |
17 |
1 |
p. 27-30 4 p. |
artikel |
17 |
Hot water, icebergs and other disasters
|
Hinde, Stephen |
|
1998 |
17 |
1 |
p. 31-33 3 p. |
artikel |
18 |
IBM ups Web hosting security
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 58- 1 p. |
artikel |
19 |
IFIP technical committee 11
|
|
|
1998 |
17 |
1 |
p. 91-93 3 p. |
artikel |
20 |
International board of referees
|
|
|
1998 |
17 |
1 |
p. 67-68 2 p. |
artikel |
21 |
Ironing out SET's wrinkles
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 58- 1 p. |
artikel |
22 |
Java authentication token
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 59- 1 p. |
artikel |
23 |
Key concerns in a review of CA-ACF2/MVS
|
Crocker, Norman |
|
1998 |
17 |
1 |
p. 42-53 12 p. |
artikel |
24 |
Land and teardrop protection
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 57-58 2 p. |
artikel |
25 |
Macro virus identification problems
|
Bontchev, Vesselin |
|
1998 |
17 |
1 |
p. 69-89 21 p. |
artikel |
26 |
Managing digital keys
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 62- 1 p. |
artikel |
27 |
Network security interest on rebound
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 58- 1 p. |
artikel |
28 |
Networks need defence against hacker attacks
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 60- 1 p. |
artikel |
29 |
Psst… wanna buy some data?
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 61-62 2 p. |
artikel |
30 |
Secret agents need not apply
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 61- 1 p. |
artikel |
31 |
Security consolidations consumer-friendly
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 57- 1 p. |
artikel |
32 |
Security goes prime-time
|
Hancock, Bill |
|
1998 |
17 |
1 |
p. 5-13 9 p. |
artikel |
33 |
Software pirating and management's quagmire
|
Bequai, August |
|
1998 |
17 |
1 |
p. 22-26 5 p. |
artikel |
34 |
Sun changes security framework for Java development kit
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 58-59 2 p. |
artikel |
35 |
The spectrum of modern firewalls
|
Nacht, Marius |
|
1998 |
17 |
1 |
p. 54-56 3 p. |
artikel |
36 |
Unlocking virtual private networks
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 62-63 2 p. |
artikel |
37 |
Virus protect aims high, falls short
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 60- 1 p. |
artikel |
38 |
Watching what you watch
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 60-61 2 p. |
artikel |
39 |
White pages for digital certificates
|
Meyer, Helen |
|
1998 |
17 |
1 |
p. 59- 1 p. |
artikel |