nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Active infections attack
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 76-77 2 p. |
artikel |
2 |
An initial plan of action for compliance with the UK's Data Protection Act 1998
|
Pounder, Chris |
|
1999 |
18 |
1 |
p. 23-27 5 p. |
artikel |
3 |
Calendar
|
|
|
1999 |
18 |
1 |
p. 81-82 2 p. |
artikel |
4 |
Can you afford not to invest in security?
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 77- 1 p. |
artikel |
5 |
Companies launch anti-virus education programme
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 76- 1 p. |
artikel |
6 |
Compaq points fingerprints at security hole
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 76- 1 p. |
artikel |
7 |
Computer hacking and cyber terrorism: the real threats in the new millennium?
|
Furnell, S.M. |
|
1999 |
18 |
1 |
p. 28-34 7 p. |
artikel |
8 |
Crypto paper set for January launch
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 76- 1 p. |
artikel |
9 |
Cyber-crime the US experience
|
Bequai, August |
|
1999 |
18 |
1 |
p. 16-18 3 p. |
artikel |
10 |
Doors open to simpler VPNs
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 78-79 2 p. |
artikel |
11 |
Editorial Board
|
|
|
1999 |
18 |
1 |
p. 2- 1 p. |
artikel |
12 |
Elliptical curve cryptography and standards for efficient cryptography group
|
Hancock, Bill |
|
1999 |
18 |
1 |
p. 4-15 12 p. |
artikel |
13 |
Flak flies over secrecy on virus
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 75- 1 p. |
artikel |
14 |
From the editor
|
Hancock, Bill |
|
1999 |
18 |
1 |
p. 2-3 2 p. |
artikel |
15 |
Hacker trial postponed
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 77- 1 p. |
artikel |
16 |
IFIP technical committee 11
|
|
|
1999 |
18 |
1 |
p. 83-85 3 p. |
artikel |
17 |
International agreement pees encryption at 64
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 77-78 2 p. |
artikel |
18 |
Interoperability drives security alliances
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 78- 1 p. |
artikel |
19 |
Know your enemy
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 80- 1 p. |
artikel |
20 |
Making the most of hacker fears
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 79- 1 p. |
artikel |
21 |
One down, one to go
|
Hinde, Stephen |
|
1999 |
18 |
1 |
p. 19-22 4 p. |
artikel |
22 |
Passwords could be past tense by 2002
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 75-76 2 p. |
artikel |
23 |
PKI, elliptic curve cryptography, and digital signatures
|
Caelli, William J |
|
1999 |
18 |
1 |
p. 47-66 20 p. |
artikel |
24 |
State-of-the-art ciphers for commercial applications
|
Preneel, Bart |
|
1999 |
18 |
1 |
p. 67-74 8 p. |
artikel |
25 |
Stronghold of security
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 79- 1 p. |
artikel |
26 |
Survival is not compulsory: an introduction to business continuity planning
|
Devargas, Mario |
|
1999 |
18 |
1 |
p. 35-46 12 p. |
artikel |
27 |
Tapping away at security
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 78- 1 p. |
artikel |
28 |
Users warned on CE security flaws
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 75- 1 p. |
artikel |
29 |
Will we all be secure in the new world?
|
Meyer, Helen |
|
1999 |
18 |
1 |
p. 79-80 2 p. |
artikel |