nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A geometric approach for shared secrets, a refinement
|
Leong Peng Chor, |
|
1998 |
17 |
8 |
p. 725-732 8 p. |
artikel |
2 |
Business is booming for the good-guy hackers
|
Meyer, John |
|
1998 |
17 |
8 |
p. 719- 1 p. |
artikel |
3 |
Calendar
|
|
|
1998 |
17 |
8 |
p. 721-722 2 p. |
artikel |
4 |
Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools
|
Venter, H.S. |
|
1998 |
17 |
8 |
p. 683-692 10 p. |
artikel |
5 |
Data protect and survive
|
Meyer, John |
|
1998 |
17 |
8 |
p. 716-717 2 p. |
artikel |
6 |
E-commerce to get strict privacy rules
|
Meyer, John |
|
1998 |
17 |
8 |
p. 719-720 2 p. |
artikel |
7 |
Employee abuses in cyberspace: Management's legal quagmire
|
Bequai, August |
|
1998 |
17 |
8 |
p. 667-670 4 p. |
artikel |
8 |
Firewalls stand the heat
|
Meyer, John |
|
1998 |
17 |
8 |
p. 716- 1 p. |
artikel |
9 |
First federal Net privacy law approved
|
Meyer, John |
|
1998 |
17 |
8 |
p. 719- 1 p. |
artikel |
10 |
Fraud artists surf new turf— Cyberspace
|
Meyer, John |
|
1998 |
17 |
8 |
p. 718- 1 p. |
artikel |
11 |
From the editor
|
Hancock, Bill |
|
1998 |
17 |
8 |
p. 652-653 2 p. |
artikel |
12 |
Hackers can get to you by E-mail
|
Meyer, John |
|
1998 |
17 |
8 |
p. 719- 1 p. |
artikel |
13 |
Hacks gain in malice, frequency
|
Meyer, John |
|
1998 |
17 |
8 |
p. 718- 1 p. |
artikel |
14 |
IFIP technical committee 11
|
|
|
1998 |
17 |
8 |
p. 733-735 3 p. |
artikel |
15 |
International Board of referees
|
|
|
1998 |
17 |
8 |
p. 723-724 2 p. |
artikel |
16 |
ISS finds security ANSA
|
Meyer, John |
|
1998 |
17 |
8 |
p. 715- 1 p. |
artikel |
17 |
Low flying hackers pose growing threat
|
Meyer, John |
|
1998 |
17 |
8 |
p. 717-718 2 p. |
artikel |
18 |
Microsoft backs feds' encryption standard
|
Meyer, John |
|
1998 |
17 |
8 |
p. 716- 1 p. |
artikel |
19 |
Netscape offers new security tool
|
Meyer, John |
|
1998 |
17 |
8 |
p. 715- 1 p. |
artikel |
20 |
Network security under attack? Buy insurance
|
Meyer, John |
|
1998 |
17 |
8 |
p. 717- 1 p. |
artikel |
21 |
Quick cracking of secret code
|
Meyer, John |
|
1998 |
17 |
8 |
p. 718-719 2 p. |
artikel |
22 |
Rich pickings for hackers
|
Meyer, John |
|
1998 |
17 |
8 |
p. 717- 1 p. |
artikel |
23 |
Security views
|
Hancock, Bill |
|
1998 |
17 |
8 |
p. 654-666 13 p. |
artikel |
24 |
Spate of hacking lets the cat out of the bag
|
Meyer, John |
|
1998 |
17 |
8 |
p. 715-716 2 p. |
artikel |
25 |
Symantec buys anti-virus line
|
Meyer, John |
|
1998 |
17 |
8 |
p. 717- 1 p. |
artikel |
26 |
Time-based security explained: Provable security models and formulas for the practitioner and vendor
|
Schwartau, Winn |
|
1998 |
17 |
8 |
p. 693-714 22 p. |
artikel |
27 |
Time, history and war: A personal voyage through Compsec '98
|
Hinde, Stephen |
|
1998 |
17 |
8 |
p. 671-681 11 p. |
artikel |