nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Attacks spur detection efforts
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 407- 1 p. |
artikel |
2 |
Calendar
|
|
|
1998 |
17 |
5 |
p. 412-414 3 p. |
artikel |
3 |
Call to arms to battle year 2000 problem
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 407- 1 p. |
artikel |
4 |
Companies lap up insurer's anti-hacker protection plan
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 408- 1 p. |
artikel |
5 |
Don't neglect browser security
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 409- 1 p. |
artikel |
6 |
Efficient and trustworthy key distribution in webs of trust
|
Borcherding, Birgit |
|
1998 |
17 |
5 |
p. 447-454 8 p. |
artikel |
7 |
Electronic commerce with secure intelligent trade agents
|
von Solms, S.H. |
|
1998 |
17 |
5 |
p. 435-446 12 p. |
artikel |
8 |
European commission takes action to secure the internet
|
Pounder, Chris |
|
1998 |
17 |
5 |
p. 392-396 5 p. |
artikel |
9 |
Europeans unlock encryption market, thanks to US rules
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 407-408 2 p. |
artikel |
10 |
Experts blast NT for its security failings
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 407- 1 p. |
artikel |
11 |
Experts criticise ‘too risky’ key recovery
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 406- 1 p. |
artikel |
12 |
Firewall reality check
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 410- 1 p. |
artikel |
13 |
From the editor
|
Hancock, Bill |
|
1998 |
17 |
5 |
p. 368-369 2 p. |
artikel |
14 |
IFIP Technical committee 11
|
|
|
1998 |
17 |
5 |
p. 455-457 3 p. |
artikel |
15 |
International board of referees
|
|
|
1998 |
17 |
5 |
p. 415-416 2 p. |
artikel |
16 |
Internet security incidents, a survey within Dutch organizations
|
Caminada, Martin |
|
1998 |
17 |
5 |
p. 417-433 17 p. |
artikel |
17 |
Let your fingers do the logging in
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 411- 1 p. |
artikel |
18 |
Managers are cutting security corners
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 406- 1 p. |
artikel |
19 |
On-line groups try to beef up privacy
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 406-407 2 p. |
artikel |
20 |
Passwords to protection
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 410- 1 p. |
artikel |
21 |
PGP disk's security takes a bite out of crime
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 409- 1 p. |
artikel |
22 |
Physical IT security
|
Benton, J.R. |
|
1998 |
17 |
5 |
p. 389-391 3 p. |
artikel |
23 |
Security tool blocks document misuse
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 409-410 2 p. |
artikel |
24 |
Security views
|
|
|
1998 |
17 |
5 |
p. 370-380 11 p. |
artikel |
25 |
Single unit offers Internet security
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 408- 1 p. |
artikel |
26 |
Six biometric devices point the finger at security
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 410-411 2 p. |
artikel |
27 |
SOCKS push
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 408-409 2 p. |
artikel |
28 |
Solar radiation is bad for you
|
Hinde, Stephen |
|
1998 |
17 |
5 |
p. 385-388 4 p. |
artikel |
29 |
Steel-cage security for Windows
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 411- 1 p. |
artikel |
30 |
Techno-crimes: Failings of the legal edifice
|
Bequai, August |
|
1998 |
17 |
5 |
p. 381-384 4 p. |
artikel |
31 |
The three categories of decision-making and information security
|
Finne, Thomas |
|
1998 |
17 |
5 |
p. 397-405 9 p. |
artikel |
32 |
Through the key holes
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 410- 1 p. |
artikel |
33 |
VPNs now can link to two-way pagers securely
|
Meyer, Helen |
|
1998 |
17 |
5 |
p. 408- 1 p. |
artikel |