nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A guide to cyber-crime investigations
|
Bequai, August |
|
1998 |
17 |
7 |
p. 579-582 4 p. |
artikel |
2 |
Axent's on security consulting
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 616- 1 p. |
artikel |
3 |
Breaking the chain
|
Gordon, Sarah |
|
1998 |
17 |
7 |
p. 586-588 3 p. |
artikel |
4 |
Bundled offering secures links
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 614- 1 p. |
artikel |
5 |
Calendar
|
|
|
1998 |
17 |
7 |
p. 619-620 2 p. |
artikel |
6 |
Corporate governance and disasters
|
Hinde, Stephen |
|
1998 |
17 |
7 |
p. 583-585 3 p. |
artikel |
7 |
Cryptographic accelerators face an uncertain future
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 616- 1 p. |
artikel |
8 |
Cryptography for the internet
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 618- 1 p. |
artikel |
9 |
Establishing an Information Systems Security Organization (ISSO)
|
Kovacich, Gerald |
|
1998 |
17 |
7 |
p. 600-612 13 p. |
artikel |
10 |
Exhibitors
|
|
|
1998 |
17 |
7 |
p. 621-631 11 p. |
artikel |
11 |
From the editor
|
Hancock, Bill |
|
1998 |
17 |
7 |
p. 562-563 2 p. |
artikel |
12 |
How computer security works
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 618- 1 p. |
artikel |
13 |
How hackers break in… and how they are caught
|
Meye, Helen |
|
1998 |
17 |
7 |
p. 618- 1 p. |
artikel |
14 |
How to ensure your internet security
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 614- 1 p. |
artikel |
15 |
IFIP Technical Committee 11
|
|
|
1998 |
17 |
7 |
p. 632-634 3 p. |
artikel |
16 |
Immunizing your system
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 616- 1 p. |
artikel |
17 |
International Board of Referees
|
|
|
1998 |
17 |
7 |
p. 635-636 2 p. |
artikel |
18 |
Is someone stalking your network?
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 617- 1 p. |
artikel |
19 |
Locking down intranets from afar — for less
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 617- 1 p. |
artikel |
20 |
May you live in interesting times
|
Ford, Richard |
|
1998 |
17 |
7 |
p. 575-578 4 p. |
artikel |
21 |
Network managers unite over bug
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 614- 1 p. |
artikel |
22 |
Protection from viruses
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 614- 1 p. |
artikel |
23 |
RNS-modulo reduction upon a restricted base value set and its applicability to RSA cryptography
|
Schwemmlein, J. |
|
1998 |
17 |
7 |
p. 637-650 14 p. |
artikel |
24 |
Security in Platinum setting
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 614- 1 p. |
artikel |
25 |
Security systems and the Y2K problem
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 613-614 2 p. |
artikel |
26 |
Slam the spam door
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 615-616 2 p. |
artikel |
27 |
Suspicious finds
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 618- 1 p. |
artikel |
28 |
The use and effectiveness of anti-virus software
|
Post, Gerald |
|
1998 |
17 |
7 |
p. 589-599 11 p. |
artikel |
29 |
This security catches on — slowly
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 616- 1 p. |
artikel |
30 |
To whom can you entrust security?
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 614-615 2 p. |
artikel |
31 |
TriStrata: a giant step in enterprise security
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 617- 1 p. |
artikel |
32 |
US finally relaxes encryption policies
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 615- 1 p. |
artikel |
33 |
‘Virtual’ privacy just not enough
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 613- 1 p. |
artikel |
34 |
Virus protection for notes and exchange
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 613- 1 p. |
artikel |
35 |
Who goes there?
|
Meyer, Helen |
|
1998 |
17 |
7 |
p. 616-617 2 p. |
artikel |
36 |
Windows-98, RIP and my Adrenaline Rush
|
Hancock, Bill |
|
1998 |
17 |
7 |
p. 564-574 11 p. |
artikel |