nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cause and effect model of attacks on information systems
|
Cohen, Fred |
|
1998 |
17 |
3 |
p. 211-221 11 p. |
artikel |
2 |
Airtight E-mail is on the way
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 224- 1 p. |
artikel |
3 |
Be careful what you say on Y2K
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 222- 1 p. |
artikel |
4 |
Burned by your firewall?
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 224-225 2 p. |
artikel |
5 |
Calendar
|
|
|
1998 |
17 |
3 |
p. 229-230 2 p. |
artikel |
6 |
Calling for a cyber cease-fire
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 228- 1 p. |
artikel |
7 |
Covering your assets, electronically
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 226- 1 p. |
artikel |
8 |
Cry havoc
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 227- 1 p. |
artikel |
9 |
2 encryption cases cast shadow on academia
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 227- 1 p. |
artikel |
10 |
Finjan SurfinGate: the lifeguard is on duty
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 222-223 2 p. |
artikel |
11 |
Forensic computing helps firms track high-tech fraud
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 223-224 2 p. |
artikel |
12 |
From the editor
|
Hancock, Bill |
|
1998 |
17 |
3 |
p. 190-191 2 p. |
artikel |
13 |
IFIP technical committee 11
|
|
|
1998 |
17 |
3 |
p. 273-275 3 p. |
artikel |
14 |
International board of referees
|
|
|
1998 |
17 |
3 |
p. 231-232 2 p. |
artikel |
15 |
IPSec for communities of interest
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 225-226 2 p. |
artikel |
16 |
Kicking firewall tires
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 223- 1 p. |
artikel |
17 |
Major hacks raise hackles, spur defenders
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 225- 1 p. |
artikel |
18 |
Managers keep an eye on security
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 223- 1 p. |
artikel |
19 |
NT firewalls: tough enough
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 227-228 2 p. |
artikel |
20 |
PC manager at center of $2m grocery scam
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 225- 1 p. |
artikel |
21 |
PGP grows up
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 223- 1 p. |
artikel |
22 |
Realisation of a minimum-knowledge identification and signature scheme
|
Coffey, T. |
|
1998 |
17 |
3 |
p. 253-264 12 p. |
artikel |
23 |
Recent security surveys
|
Hinde, Stephen |
|
1998 |
17 |
3 |
p. 207-210 4 p. |
artikel |
24 |
Reversible data mixing procedure for efficient public-key encryption
|
Matyas, Mike |
|
1998 |
17 |
3 |
p. 265-272 8 p. |
artikel |
25 |
Security companies hype up Java risks
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 226- 1 p. |
artikel |
26 |
Security services
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 224- 1 p. |
artikel |
27 |
Security tools, specs offer more protection
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 226-227 2 p. |
artikel |
28 |
Security Views
|
Hancock, Bill |
|
1998 |
17 |
3 |
p. 192-200 9 p. |
artikel |
29 |
Senate probes State Department security
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 225- 1 p. |
artikel |
30 |
Signs point to looser encryption rules
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 225- 1 p. |
artikel |
31 |
Software source code, visual risk analysis: an example
|
van der Merwe, Gert |
|
1998 |
17 |
3 |
p. 233-252 20 p. |
artikel |
32 |
The revenue men
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 226- 1 p. |
artikel |
33 |
U-turn on net trade security
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 222- 1 p. |
artikel |
34 |
Virus protection software
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 227- 1 p. |
artikel |
35 |
Windows NT casts a shaky Web
|
McClure, Ben |
|
1998 |
17 |
3 |
p. 224- 1 p. |
artikel |
36 |
Y2000 enters the body politic
|
Maddison, Nicky |
|
1998 |
17 |
3 |
p. 201-206 6 p. |
artikel |