nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1999 |
18 |
8 |
p. 705-710 6 p. |
artikel |
2 |
Calendar
|
|
|
1999 |
18 |
8 |
p. 711-712 2 p. |
artikel |
3 |
Computer crime and abuse: A survey of public attitudes and awareness
|
Dowland, P.S. |
|
1999 |
18 |
8 |
p. 715-726 12 p. |
artikel |
4 |
From the editor
|
|
|
1999 |
18 |
8 |
p. 644-645 2 p. |
artikel |
5 |
IFIP technical committee 11
|
|
|
1999 |
18 |
8 |
p. 734-736 3 p. |
artikel |
6 |
International board of referees
|
|
|
1999 |
18 |
8 |
p. 713-714 2 p. |
artikel |
7 |
Network based intrusion detection: A review of technologies
|
Richards, Kevin |
|
1999 |
18 |
8 |
p. 671-682 12 p. |
artikel |
8 |
Password authentication schemes with smart cards
|
Yang, Wen-Her |
|
1999 |
18 |
8 |
p. 727-733 7 p. |
artikel |
9 |
Security view
|
|
|
1999 |
18 |
8 |
p. 646-659 14 p. |
artikel |
10 |
Step into a secure new world — Compsec '99 report
|
Hinde, Stephen |
|
1999 |
18 |
8 |
p. 660-669 10 p. |
artikel |
11 |
Telecommunications crime — Part 2
|
Collins, Michael |
|
1999 |
18 |
8 |
p. 683-692 10 p. |
artikel |
12 |
Y2K contingency planning: Taking BCM into the 21st century
|
Nosworthy, Julie D |
|
1999 |
18 |
8 |
p. 693-704 12 p. |
artikel |