nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A better lock for 'Net data
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 519- 1 p. |
artikel |
2 |
A confused document encrypting scheme and its implementation
|
Chu-Hsing Lin, |
|
1998 |
17 |
6 |
p. 543-551 9 p. |
artikel |
3 |
A false sense of security
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 520- 1 p. |
artikel |
4 |
A Fundamental Framework for Network Security Towards Enabling Security on Demand in an ATM Network
|
Schumacher, H.J.(Jerry) |
|
1998 |
17 |
6 |
p. 527-542 16 p. |
artikel |
5 |
A note on the role of deception in information protection
|
Cohen, Fred |
|
1998 |
17 |
6 |
p. 483-506 24 p. |
artikel |
6 |
Calendar
|
|
|
1998 |
17 |
6 |
p. 522-524 3 p. |
artikel |
7 |
Coast Guard beefs up security after hack
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 519-520 2 p. |
artikel |
8 |
Companies found guilty face criminal prosecutions
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 517-518 2 p. |
artikel |
9 |
Compsec 98 International
|
|
|
1998 |
17 |
6 |
p. 556-560 5 p. |
artikel |
10 |
Creating security applications based on The Global Certificate Management System
|
Kapidzic, Nada |
|
1998 |
17 |
6 |
p. 507-515 9 p. |
artikel |
11 |
Encryption plan targets export restriction
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 518- 1 p. |
artikel |
12 |
Firewall expands purview
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 519- 1 p. |
artikel |
13 |
Firewalls aren't failsafe
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 517- 1 p. |
artikel |
14 |
From the editor
|
Hancock, Bill |
|
1998 |
17 |
6 |
p. 460-461 2 p. |
artikel |
15 |
Hacker defaces German pol site
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 517- 1 p. |
artikel |
16 |
IBM hedges its bets on SET
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 516- 1 p. |
artikel |
17 |
IFIP Technical Committee 11
|
|
|
1998 |
17 |
6 |
p. 553-555 3 p. |
artikel |
18 |
In Russia: digital eavesdropping?
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 519- 1 p. |
artikel |
19 |
International Board of Referees
|
|
|
1998 |
17 |
6 |
p. 525-526 2 p. |
artikel |
20 |
Is network intrusion detection software being used correctly?
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 521- 1 p. |
artikel |
21 |
LAN-to-LAN VPNs: secure enough?
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 521- 1 p. |
artikel |
22 |
Net security best policy for insurer
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 520- 1 p. |
artikel |
23 |
Novell remote security freebie now for sale
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 518- 1 p. |
artikel |
24 |
Privacy and security — The drivers for growth of E-Commerce
|
Hinde, Stephen |
|
1998 |
17 |
6 |
p. 475-478 4 p. |
artikel |
25 |
Security integration to simplify user access
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 516- 1 p. |
artikel |
26 |
Security, management converge
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 518-519 2 p. |
artikel |
27 |
Security tradeshows — Good or bad?
|
Hancock, Bill |
|
1998 |
17 |
6 |
p. 462-474 13 p. |
artikel |
28 |
Technology and trust: the final analysis
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 520- 1 p. |
artikel |
29 |
The Annual Report of the UK Data Protection Registrar
|
Pounder, Chris |
|
1998 |
17 |
6 |
p. 479-482 4 p. |
artikel |
30 |
Titans aim at crypto stalemate
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 516-517 2 p. |
artikel |
31 |
Warning for UK authorities over data matching
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 517- 1 p. |
artikel |
32 |
WSS put its stamp on E-mail security
|
Meyer, Helen |
|
1998 |
17 |
6 |
p. 521- 1 p. |
artikel |