Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             30 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abstracts of Recent Articles and Literature Palmer, Chloë
2000
19 6 p. 540-546
7 p.
artikel
2 A Mathematical Structure of Simple Defensive Network Deceptions Cohen, Fred
2000
19 6 p. 520-528
9 p.
artikel
3 A Need for a Network Security Czar Hancock, Bill
2000
19 6 p. 476-477
2 p.
artikel
4 Authentication and Supervision: A Survey of User Attitudes Furnell, S.M
2000
19 6 p. 529-539
11 p.
artikel
5 DDoS Defence Gets Regulatory Hancock, Bill
2000
19 6 p. 483-485
3 p.
artikel
6 DefCon Recruiting JamFest Hancock, Bill
2000
19 6 p. 493-494
2 p.
artikel
7 Digital Certificates Get Creative Hancock, Bill
2000
19 6 p. 480-487
8 p.
artikel
8 E-Commerce Paranoia: Flaws in Code Hancock, Bill
2000
19 6 p. 477-479
3 p.
artikel
9 E-Mail Privacy Issues Escalate Hancock, Bill
2000
19 6 p. 495-
1 p.
artikel
10 Fireworks, Beer and Old Halfpennies — The Risks of Assumption Hinde, Stephen
2000
19 6 p. 499-504
6 p.
artikel
11 From The Editor Hancock, Bill
2000
19 6 p. 474-475
2 p.
artikel
12 GeoCities Ordered to Report on Information Poster Hancock, Bill
2000
19 6 p. 495-496
2 p.
artikel
13 Hackers Breach Firewall-1 Hancock, Bill
2000
19 6 p. 496-497
2 p.
artikel
14 Hackers Still Love to Attack the Pentagon Hancock, Bill
2000
19 6 p. 488-
1 p.
artikel
15 Hacker Target: Mobile Phones Hancock, Bill
2000
19 6 p. 494-495
2 p.
artikel
16 Health Care Security: A Hard Look at a Growing Problem Hancock, Bill
2000
19 6 p. 482-
1 p.
artikel
17 Information Security in Multiprocessor Systems Based on the X86 Architecture Torrubia, Andres
2000
19 6 p. 559-563
5 p.
artikel
18 Is a Convicted Hacker Really Reformed and Should You Hire Them? Hancock, Bill
2000
19 6 p. 491-493
3 p.
artikel
19 Lotus Domino Holes Up Hancock, Bill
2000
19 6 p. 497-498
2 p.
artikel
20 ‘Mafiaboy’ Hit With 64 New Charges Hancock, Bill
2000
19 6 p. 496-
1 p.
artikel
21 Netspionage — Part III: The Black Zone, Who Uses Netspionage, How and Why 25 25 This article is an excerpt from Netspionage: The Threats to Global Information, a new book written by Dr. Gerald L. Kovacich and William C. Boni; to be published by Butterworth-Heinemann in September 2000. Additional information about the authors and their works can be found at http://www.shockwavewriters.com. Kovacich, Gerald L
2000
19 6 p. 505-519
15 p.
artikel
22 Philippine Government Creates Incident Response Team Hancock, Bill
2000
19 6 p. 483-
1 p.
artikel
23 ‘Porngate’? Hancock, Bill
2000
19 6 p. 486-487
2 p.
artikel
24 Safeway UK’s Website Shut Down Hancock, Bill
2000
19 6 p. 483-
1 p.
artikel
25 Spying At Home: A New Pastime to Detect Online Romance Hancock, Bill
2000
19 6 p. 488-491
4 p.
artikel
26 Ticket and Challenge-Based Protocols for Timestamping Peyravian, Mohammad
2000
19 6 p. 551-558
8 p.
artikel
27 Truly Certified: Security Certifications Update Hancock, Bill
2000
19 6 p. 479-480
2 p.
artikel
28 US Government Fighting for Expanded Wiretap Laws Hancock, Bill
2000
19 6 p. 477-
1 p.
artikel
29 Visa’s Ten Commandments for E-Security Online Hancock, Bill
2000
19 6 p. 485-486
2 p.
artikel
30 What You Sell Online in France Could Be Restricted… Hancock, Bill
2000
19 6 p. 487-
1 p.
artikel
                             30 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland