nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of Recent Articles and Literature
|
Palmer, Chloë |
|
2000 |
19 |
6 |
p. 540-546 7 p. |
artikel |
2 |
A Mathematical Structure of Simple Defensive Network Deceptions
|
Cohen, Fred |
|
2000 |
19 |
6 |
p. 520-528 9 p. |
artikel |
3 |
A Need for a Network Security Czar
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 476-477 2 p. |
artikel |
4 |
Authentication and Supervision: A Survey of User Attitudes
|
Furnell, S.M |
|
2000 |
19 |
6 |
p. 529-539 11 p. |
artikel |
5 |
DDoS Defence Gets Regulatory
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 483-485 3 p. |
artikel |
6 |
DefCon Recruiting JamFest
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 493-494 2 p. |
artikel |
7 |
Digital Certificates Get Creative
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 480-487 8 p. |
artikel |
8 |
E-Commerce Paranoia: Flaws in Code
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 477-479 3 p. |
artikel |
9 |
E-Mail Privacy Issues Escalate
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 495- 1 p. |
artikel |
10 |
Fireworks, Beer and Old Halfpennies — The Risks of Assumption
|
Hinde, Stephen |
|
2000 |
19 |
6 |
p. 499-504 6 p. |
artikel |
11 |
From The Editor
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 474-475 2 p. |
artikel |
12 |
GeoCities Ordered to Report on Information Poster
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 495-496 2 p. |
artikel |
13 |
Hackers Breach Firewall-1
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 496-497 2 p. |
artikel |
14 |
Hackers Still Love to Attack the Pentagon
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 488- 1 p. |
artikel |
15 |
Hacker Target: Mobile Phones
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 494-495 2 p. |
artikel |
16 |
Health Care Security: A Hard Look at a Growing Problem
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 482- 1 p. |
artikel |
17 |
Information Security in Multiprocessor Systems Based on the X86 Architecture
|
Torrubia, Andres |
|
2000 |
19 |
6 |
p. 559-563 5 p. |
artikel |
18 |
Is a Convicted Hacker Really Reformed and Should You Hire Them?
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 491-493 3 p. |
artikel |
19 |
Lotus Domino Holes Up
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 497-498 2 p. |
artikel |
20 |
‘Mafiaboy’ Hit With 64 New Charges
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 496- 1 p. |
artikel |
21 |
Netspionage — Part III: The Black Zone, Who Uses Netspionage, How and Why 25 25 This article is an excerpt from Netspionage: The Threats to Global Information, a new book written by Dr. Gerald L. Kovacich and William C. Boni; to be published by Butterworth-Heinemann in September 2000. Additional information about the authors and their works can be found at http://www.shockwavewriters.com.
|
Kovacich, Gerald L |
|
2000 |
19 |
6 |
p. 505-519 15 p. |
artikel |
22 |
Philippine Government Creates Incident Response Team
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 483- 1 p. |
artikel |
23 |
‘Porngate’?
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 486-487 2 p. |
artikel |
24 |
Safeway UK’s Website Shut Down
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 483- 1 p. |
artikel |
25 |
Spying At Home: A New Pastime to Detect Online Romance
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 488-491 4 p. |
artikel |
26 |
Ticket and Challenge-Based Protocols for Timestamping
|
Peyravian, Mohammad |
|
2000 |
19 |
6 |
p. 551-558 8 p. |
artikel |
27 |
Truly Certified: Security Certifications Update
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 479-480 2 p. |
artikel |
28 |
US Government Fighting for Expanded Wiretap Laws
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 477- 1 p. |
artikel |
29 |
Visa’s Ten Commandments for E-Security Online
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 485-486 2 p. |
artikel |
30 |
What You Sell Online in France Could Be Restricted…
|
Hancock, Bill |
|
2000 |
19 |
6 |
p. 487- 1 p. |
artikel |