nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
20% annual increase on card fraud
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 233- 1 p. |
artikel |
2 |
Anonymizer service could compromise kosovar residents need for privacy
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 191-192 2 p. |
artikel |
3 |
Are you in control?
|
Hinde, Stephen |
|
1999 |
18 |
3 |
p. 199-203 5 p. |
artikel |
4 |
Back orifice prevention tool to be released
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 195- 1 p. |
artikel |
5 |
Better snapshots of enterprise security
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 233-234 2 p. |
artikel |
6 |
Calendar
|
|
|
1999 |
18 |
3 |
p. 237-238 2 p. |
artikel |
7 |
Certificate inter-operability — white paper
|
Hughes, John |
|
1999 |
18 |
3 |
p. 221-230 10 p. |
artikel |
8 |
China glides into internet mainstream
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 186-188 3 p. |
artikel |
9 |
Combating computer viruses
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 235-236 2 p. |
artikel |
10 |
1999 CSI/FBI survey: Cyberattacks on the rise
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 188-189 2 p. |
artikel |
11 |
Cybercop scanner
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 234- 1 p. |
artikel |
12 |
eBay auction site gets compromised
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 186- 1 p. |
artikel |
13 |
European organizations at risk from virus infection
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 232- 1 p. |
artikel |
14 |
First internet e-mail corporate usage report; concludes e-mail abuse at epidemic levels
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 188- 1 p. |
artikel |
15 |
Free file encryption offered
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 231- 1 p. |
artikel |
16 |
‘Free-mail’ systems great targets for hackers
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 189- 1 p. |
artikel |
17 |
From the editor
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 182-183 2 p. |
artikel |
18 |
Harmonized copyright rules across Europe
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 232-233 2 p. |
artikel |
19 |
IFIP technical committee 11
|
|
|
1999 |
18 |
3 |
p. 271-273 3 p. |
artikel |
20 |
Internal information theft in US on the rise
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 184- 1 p. |
artikel |
21 |
International board of referees
|
|
|
1999 |
18 |
3 |
p. 239-240 2 p. |
artikel |
22 |
Interpol calls for key recovery
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 195- 1 p. |
artikel |
23 |
I-way robbery: Crime on the internet
|
Kovacich, Gerald L. |
|
1999 |
18 |
3 |
p. 211-220 10 p. |
artikel |
24 |
Kevin Mitnick finally gets a plea — and a sentence
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 196-197 2 p. |
artikel |
25 |
Managing multi level security in a military intranet environment
|
von Solms, S.H. |
|
1999 |
18 |
3 |
p. 257-270 14 p. |
artikel |
26 |
Mapping a network security strategy
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 236- 1 p. |
artikel |
27 |
MCI WorldCom joins managed security fray
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 231-232 2 p. |
artikel |
28 |
Melissa the macrovirus has an author…
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 184-186 3 p. |
artikel |
29 |
More bark than bite
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 236- 1 p. |
artikel |
30 |
More fraud: Visa international states e-commerce is major fraud source
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 194- 1 p. |
artikel |
31 |
Novell maybe causing privacy concerns with digitalme
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 190-191 2 p. |
artikel |
32 |
One in three local authorities in the UK vulnerable to privacy cyberattacks
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 197-198 2 p. |
artikel |
33 |
Online fraud increasing rapidly
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 194- 1 p. |
artikel |
34 |
Pentium III ID cracked by german group
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 192-193 2 p. |
artikel |
35 |
Protection from chernobyl virus
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 231- 1 p. |
artikel |
36 |
Providers beef up VPNs with security
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 233- 1 p. |
artikel |
37 |
SAFE bill clears next hurdle in US legislature
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 193- 1 p. |
artikel |
38 |
Securing windows NT server
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 236- 1 p. |
artikel |
39 |
Security takes front seat at pentium preview
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 232- 1 p. |
artikel |
40 |
Security teams failing to shine
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 234- 1 p. |
artikel |
41 |
Strong encryption for internal use only?
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 234- 1 p. |
artikel |
42 |
The need for host authentication
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 235- 1 p. |
artikel |
43 |
The problems of wordmacro virus upconversion
|
Bontchev, Vesselin |
|
1999 |
18 |
3 |
p. 241-255 15 p. |
artikel |
44 |
To catch an internet thief
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 234-235 2 p. |
artikel |
45 |
US feds ask for public sector help to prosecute cybercrime
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 189-190 2 p. |
artikel |
46 |
US government states protections needed for companies to come forward with cyberattack reports
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 192- 1 p. |
artikel |
47 |
Web data-protection offerings readied
|
Meyer, Helen |
|
1999 |
18 |
3 |
p. 231- 1 p. |
artikel |
48 |
Windows NT security: Kudos, concerns, and prescriptions
|
Schultz, E.Eugene |
|
1999 |
18 |
3 |
p. 204-210 7 p. |
artikel |
49 |
World wide web abusive use widespread
|
Hancock, Bill |
|
1999 |
18 |
3 |
p. 195-196 2 p. |
artikel |