nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Biometric Standard for Information Management and Security
|
Matyas Jr., Stephen M |
|
2000 |
19 |
5 |
p. 428-441 14 p. |
artikel |
2 |
Abstracts of Recent Articles and Literature
|
Nichol, Sandy |
|
2000 |
19 |
5 |
p. 443-448 6 p. |
artikel |
3 |
A Generic Electronic Payment Model Supporting Multiple Merchant Transactions
|
Huang, Yu-Lun |
|
2000 |
19 |
5 |
p. 453-465 13 p. |
artikel |
4 |
And Now, the Bug-in-Your-Site Award Goes To…
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 404- 1 p. |
artikel |
5 |
AOL Gets Busted — Again
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 402- 1 p. |
artikel |
6 |
…But the Industry Wants Self-Regulation
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 394-395 2 p. |
artikel |
7 |
Canadian Credit Card Conundrum Caused by a Cracker
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 397-398 2 p. |
artikel |
8 |
CIO’s Get Serious About Best Security Practices
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 388- 1 p. |
artikel |
9 |
CMU Sets Up a Sister to CERT
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 400-401 2 p. |
artikel |
10 |
Extortion Going Online
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 392-393 2 p. |
artikel |
11 |
From The Editor
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 380-381 2 p. |
artikel |
12 |
G8 Thinks About Cybercrime (It’s About Time, Too)
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 405-407 3 p. |
artikel |
13 |
Home PC’s Targeted by Hackers (Duh!)
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 387-388 2 p. |
artikel |
14 |
“I Agree” Legal Agreements Get Legislated
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 383-384 2 p. |
artikel |
15 |
Isn’t It Interesting What You Can Buy At An Auction Site? TV’s, Computers, Drugs…
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 404-405 2 p. |
artikel |
16 |
Love Conquers All?
|
Hinde, Stephen |
|
2000 |
19 |
5 |
p. 408-420 13 p. |
artikel |
17 |
Methods for Protecting Password Transmission
|
Peyravian, Mohammad |
|
2000 |
19 |
5 |
p. 466-469 4 p. |
artikel |
18 |
Microsoft a Popular Virus Target Due to Ubiquity
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 389-391 3 p. |
artikel |
19 |
Netspionage — The Global Threat to Information, Part II: Information Collection in the Gray Zone
|
Kovacich, Gerald L |
|
2000 |
19 |
5 |
p. 421-427 7 p. |
artikel |
20 |
Network Solutions Re-evaluates Security
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 398-400 3 p. |
artikel |
21 |
Office 2000 Patch Recommended by CERT
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 393- 1 p. |
artikel |
22 |
PGP V5.0 Keys Potentially Insecure
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 396-397 2 p. |
artikel |
23 |
Security Views
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 382-383 2 p. |
artikel |
24 |
Self-Regulation for Privacy Doesn’t Work Says FTC
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 393-394 2 p. |
artikel |
25 |
Speedy Response Yields Success at DOE
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 401- 1 p. |
artikel |
26 |
Suspect Charged in ‘Love Bug’ Worm has Charges Dropped
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 398- 1 p. |
artikel |
27 |
The US Government Tells Its Users to Clean Up Their E-mail
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 385-387 3 p. |
artikel |
28 |
UK’s RIP Bill Creates Official Snooping
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 391-392 2 p. |
artikel |
29 |
US Senate Wakes Up to Need for Cybertools for Law Enforcers
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 395-396 2 p. |
artikel |
30 |
Who’s to Blame?
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 402-403 2 p. |
artikel |
31 |
Wireless Ubiquity for E-Biz
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 403- 1 p. |
artikel |
32 |
Yahoo Faces Identity Crisis
|
Hancock, Bill |
|
2000 |
19 |
5 |
p. 389- 1 p. |
artikel |