nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A structured symmetric-key block cipher
|
Peyravian, Mohammad |
|
1999 |
18 |
2 |
p. 134-147 14 p. |
artikel |
2 |
A unique Canadian approach — Invite the hacker to nail your networks
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 103-104 2 p. |
artikel |
3 |
Author index for volume 17
|
|
|
1999 |
18 |
2 |
p. 157- 1 p. |
artikel |
4 |
Better business bureau gets involved in online privacy
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 99-100 2 p. |
artikel |
5 |
56-bit DES algorithm broken in record time
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 149-150 2 p. |
artikel |
6 |
Calendar
|
|
|
1999 |
18 |
2 |
p. 155-156 2 p. |
artikel |
7 |
European parliament promotes a safer internet
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 98-99 2 p. |
artikel |
8 |
Fairwall certification
|
Harris, Brendon |
|
1999 |
18 |
2 |
p. 165-177 13 p. |
artikel |
9 |
Fingerprint sensors solve security problems
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 149- 1 p. |
artikel |
10 |
France lightens up cryptographic use
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 100- 1 p. |
artikel |
11 |
From the editor
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 88-89 2 p. |
artikel |
12 |
Hacker gets jail time for ISP break-ins
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 152- 1 p. |
artikel |
13 |
HTML security hole in Excel can invade PCs
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 150- 1 p. |
artikel |
14 |
IFIP technical committee 11
|
|
|
1999 |
18 |
2 |
p. 178-180 3 p. |
artikel |
15 |
Information warfare — The next front
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 101-102 2 p. |
artikel |
16 |
International board of referees
|
|
|
1999 |
18 |
2 |
p. 163-164 2 p. |
artikel |
17 |
Internet2 testbed going online at a network near you
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 93-94 2 p. |
artikel |
18 |
Lock up your data
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 153- 1 p. |
artikel |
19 |
Making IPSec work for you
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 154- 1 p. |
artikel |
20 |
Malware: Troy revisited
|
Ford, Richard |
|
1999 |
18 |
2 |
p. 105-108 4 p. |
artikel |
21 |
Medical records accidentally posted to the web
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 98- 1 p. |
artikel |
22 |
Monitoring employee communications in cyberspace: The pitfalls facing management
|
Bequai, August |
|
1999 |
18 |
2 |
p. 109-112 4 p. |
artikel |
23 |
Motorola CipherNET certifies security
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 153- 1 p. |
artikel |
24 |
MS Office 2000 virus infestation — Already
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 94-95 2 p. |
artikel |
25 |
Netbus hacker tool presents a greater threat to Windows shops than BackOrifice
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 150- 1 p. |
artikel |
26 |
Network security for all
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 154- 1 p. |
artikel |
27 |
New IETF task force on intrusion detection
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 96- 1 p. |
artikel |
28 |
NT passwords for sale
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 92- 1 p. |
artikel |
29 |
Pessimism in cyberspace is alive and well
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 95-96 2 p. |
artikel |
30 |
PGP 6.0: Pro Crypto suite gets personal
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 151-152 2 p. |
artikel |
31 |
PKI heads for mainstream
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 151- 1 p. |
artikel |
32 |
Privacy group blasts new cryptography laws
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 151- 1 p. |
artikel |
33 |
Privacy problems on the rise
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 90-92 3 p. |
artikel |
34 |
RSA goes down under to dodge export laws
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 152- 1 p. |
artikel |
35 |
Security elite SWAT at viruses
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 151- 1 p. |
artikel |
36 |
Security research alliance begins
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 95- 1 p. |
artikel |
37 |
Server -based Java security products help guard your enterprise flank
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 153-154 2 p. |
artikel |
38 |
Sidewinder Security Server 4.0
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 153- 1 p. |
artikel |
39 |
Students in Virginia hacks NASA
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 102-103 2 p. |
artikel |
40 |
Subject index for volume 17
|
|
|
1999 |
18 |
2 |
p. 158-162 5 p. |
artikel |
41 |
Surviving denial of service
|
Schwartau, Winn |
|
1999 |
18 |
2 |
p. 124-133 10 p. |
artikel |
42 |
Teen crackers being used by professional thieves
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 100-101 2 p. |
artikel |
43 |
Telephone tales
|
Gordon, Sarah |
|
1999 |
18 |
2 |
p. 120-123 4 p. |
artikel |
44 |
Think twice before becoming a hacker attacker
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 150- 1 p. |
artikel |
45 |
U.S. Department of Defense worries about event exposure via aggregation techniques
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 97- 1 p. |
artikel |
46 |
Vendors plan chip-level security systems
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 149- 1 p. |
artikel |
47 |
Vendors to roll out centralized security tools, services
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 152-153 2 p. |
artikel |
48 |
Want a free PC? give up your privacy, first
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 90- 1 p. |
artikel |
49 |
When Cisco talks about VPNs…
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 94- 1 p. |
artikel |
50 |
Windows-NT Service Pack 4 security woes
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 98- 1 p. |
artikel |
51 |
Windows-2000 requires re-building of code
|
Hancock, Bill |
|
1999 |
18 |
2 |
p. 99- 1 p. |
artikel |
52 |
Year 2000 update
|
Hinde, Stephen |
|
1999 |
18 |
2 |
p. 113-119 7 p. |
artikel |
53 |
Y2K may mask hacker attacks
|
Meyer, Helen |
|
1999 |
18 |
2 |
p. 152- 1 p. |
artikel |