nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Airports told of flaw in security system
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 158- 1 p. |
artikel |
2 |
A Method for Measuring Entropy of Symmetric Cipher Key Generators
|
Dawson, E.P. |
|
1998 |
17 |
2 |
p. 177-184 8 p. |
artikel |
3 |
AOL users fall prey to hackers' dirty tricks
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 153- 1 p. |
artikel |
4 |
A security architecture for the Internet Protocol
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 155- 1 p. |
artikel |
5 |
Author index for volume 16
|
|
|
1998 |
17 |
2 |
p. 162- 1 p. |
artikel |
6 |
Banking on a secure Internet
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 156- 1 p. |
artikel |
7 |
Calendar
|
|
|
1998 |
17 |
2 |
p. 160-161 2 p. |
artikel |
8 |
Can security pierce the electronic veil?
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 157- 1 p. |
artikel |
9 |
Cyber-IDs will soon be at your fingertips
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 158- 1 p. |
artikel |
10 |
Cyber Wars and other threats
|
Hinde, Stephen |
|
1998 |
17 |
2 |
p. 115-118 4 p. |
artikel |
11 |
Electronic-internet business and security
|
Kovacich, Gerald |
|
1998 |
17 |
2 |
p. 129-135 7 p. |
artikel |
12 |
Firms to be forced to disclose year 2000 risks
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 154- 1 p. |
artikel |
13 |
From the Editor
|
Hancock, Bill |
|
1998 |
17 |
2 |
p. 96-97 2 p. |
artikel |
14 |
IFIP TC11 news
|
|
|
1998 |
17 |
2 |
p. 151-152 2 p. |
artikel |
15 |
IFIP technical committee 11
|
|
|
1998 |
17 |
2 |
p. 185-187 3 p. |
artikel |
16 |
Immigration computer system less than secure
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 154- 1 p. |
artikel |
17 |
International board of referees
|
|
|
1998 |
17 |
2 |
p. 169-170 2 p. |
artikel |
18 |
Internet risks for companies
|
Lichtenstein, Sharman |
|
1998 |
17 |
2 |
p. 143-150 8 p. |
artikel |
19 |
Internet security on a budget
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 155-156 2 p. |
artikel |
20 |
Internet vandals pose threat by using new attack mode called ‘smurfing’
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 154- 1 p. |
artikel |
21 |
Java kit gets better security
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 158- 1 p. |
artikel |
22 |
Labour acts to clean up digital certificate mess
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 157- 1 p. |
artikel |
23 |
MasterCard makes SET more attractive
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 158- 1 p. |
artikel |
24 |
New antivirus packages get serious
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 156- 1 p. |
artikel |
25 |
No SET commitment, yet
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 155- 1 p. |
artikel |
26 |
Online security leak
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 155- 1 p. |
artikel |
27 |
On probabilities of hash value matches
|
Peyravian, Mohammad |
|
1998 |
17 |
2 |
p. 171-176 6 p. |
artikel |
28 |
Plugging security holes
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 154-155 2 p. |
artikel |
29 |
Reducing charges of E-comm harassment
|
Moulton, Mark |
|
1998 |
17 |
2 |
p. 137-142 6 p. |
artikel |
30 |
Reno to set up center to thwart ‘cyber-attackers’
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 158-159 2 p. |
artikel |
31 |
Report faults FAA on Year 2000 hiccup
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 153-154 2 p. |
artikel |
32 |
Reuters subsidiary target of US inquiry into theft of data from Bloomberg
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 157- 1 p. |
artikel |
33 |
Russian hacker enters fraud plea in Citicorp case
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 154- 1 p. |
artikel |
34 |
Safety in numbers?
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 159- 1 p. |
artikel |
35 |
Security and culture
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 153- 1 p. |
artikel |
36 |
Security and the new Data Protection law
|
Pounder, Chris |
|
1998 |
17 |
2 |
p. 124-128 5 p. |
artikel |
37 |
Security giant moves to plug leaks in PC safety
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 153- 1 p. |
artikel |
38 |
Study: security audits often neglected by many
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 155- 1 p. |
artikel |
39 |
Subject index for volume 16
|
|
|
1998 |
17 |
2 |
p. 163-168 6 p. |
artikel |
40 |
Target: NT
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 156- 1 p. |
artikel |
41 |
The ten commandments of security
|
Lau, Oliver |
|
1998 |
17 |
2 |
p. 119-123 5 p. |
artikel |
42 |
US losing battle on control of data encryption, study says
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 154- 1 p. |
artikel |
43 |
US rethinks Net security plans after hijack plot
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 156-157 2 p. |
artikel |
44 |
Weak SNMP?
|
McClure, Ben |
|
1998 |
17 |
2 |
p. 157- 1 p. |
artikel |
45 |
What a littledefinution can do
|
Ford, Richard |
|
1998 |
17 |
2 |
p. 110-114 5 p. |
artikel |
46 |
Who do you call for, CISSP
|
Hancock, Bill |
|
1998 |
17 |
2 |
p. 99-109 11 p. |
artikel |