nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of Recent Articles and Literature
|
Palmer, Chloë |
|
2000 |
19 |
8 |
p. 720-725 6 p. |
artikel |
2 |
America’s Internet Commerce and The Threat of Fraud
|
Bequai, August |
|
2000 |
19 |
8 |
p. 688-691 4 p. |
artikel |
3 |
Canadian Teen Mafiaboy Pleads Guilty
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 669- 1 p. |
artikel |
4 |
CIA Chat Room Causes Grief
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 674-676 3 p. |
artikel |
5 |
Feeling Sorry for Microsoft?
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 665-666 2 p. |
artikel |
6 |
From Stones in the Street to Cyberspace — Israeli and Palestinians Continue Their Virtual Battles 24×7
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 664-665 2 p. |
artikel |
7 |
From The Editor
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 662-663 2 p. |
artikel |
8 |
Getting the Laws to Help Combat Cybercrime (There’s a grand idea)
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 669-670 2 p. |
artikel |
9 |
Hacktivism Increasing
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 673-674 2 p. |
artikel |
10 |
However, Microsoft Could Use Some Sympathy — Dutch Hacker Busts Microsoft Web Site - Again
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 666-667 2 p. |
artikel |
11 |
Information Security Management: An Approach to Combine Process Certification And Product Evaluation
|
Eloff, M.M |
|
2000 |
19 |
8 |
p. 698-709 12 p. |
artikel |
12 |
Internet Biz Group Calls for Cybercrime Treaty Delay
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 671- 1 p. |
artikel |
13 |
Japan Creates Cyberconditions for IT National Revolution
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 676-677 2 p. |
artikel |
14 |
Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 671-673 3 p. |
artikel |
15 |
NASA Hacker Pleads Guilty
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 668-669 2 p. |
artikel |
16 |
New Names For Old — A Personal Surf Through Compsec 2000
|
Hinde, Stephen |
|
2000 |
19 |
8 |
p. 679-687 9 p. |
artikel |
17 |
Opening Up The Enterprise
|
Sherwood, John |
|
2000 |
19 |
8 |
p. 710-719 10 p. |
artikel |
18 |
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
|
Gritzalis, Stefanos |
|
2000 |
19 |
8 |
p. 731-746 16 p. |
artikel |
19 |
The Software Colander — Holes in Messaging
|
Clarke, Andy |
|
2000 |
19 |
8 |
p. 692-697 6 p. |
artikel |
20 |
US Department of Defense Prepares Cybercrime Database
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 674- 1 p. |
artikel |
21 |
US Privacy Law Proposals Cause Concerns
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 677-678 2 p. |
artikel |
22 |
Wireless Big Brother
|
Hancock, Bill |
|
2000 |
19 |
8 |
p. 667-668 2 p. |
artikel |