nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of Recent Articles and Literature
|
Palmer, Chloë |
|
2001 |
20 |
5 |
p. 400-403 4 p. |
artikel |
2 |
A Framework for the Implementation of Socio-ethical Controls in Information Security
|
Trompeter, C.M. |
|
2001 |
20 |
5 |
p. 384-391 8 p. |
artikel |
3 |
Calendar
|
|
|
2001 |
20 |
5 |
p. 405-406 2 p. |
artikel |
4 |
Computer Licence Plates
|
Cusick, Thomas W |
|
2001 |
20 |
5 |
p. 392-394 3 p. |
artikel |
5 |
Conference Report — the Global Forum for Law Enforcement and National Security, Edinburgh, 2001
|
Evans, Paul |
|
2001 |
20 |
5 |
p. 395-399 5 p. |
artikel |
6 |
Cyberthreats: Perceptions, Reality and Protection
|
Hinde, Stephen |
|
2001 |
20 |
5 |
p. 364-371 8 p. |
artikel |
7 |
From The Editor
|
Hancock, Bill |
|
2001 |
20 |
5 |
p. 346-347 2 p. |
artikel |
8 |
GUIDE FOR AUTHORS
|
|
|
2001 |
20 |
5 |
p. 446- 1 p. |
artikel |
9 |
IFIP Technical Committee 11
|
|
|
2001 |
20 |
5 |
p. 441-443 3 p. |
artikel |
10 |
Information Systems Audit Trails in Legal Proceedings as Evidence
|
Allinson, Caroline |
|
2001 |
20 |
5 |
p. 409-421 13 p. |
artikel |
11 |
International Board of referees
|
|
|
2001 |
20 |
5 |
p. 407-408 2 p. |
artikel |
12 |
Multi-party Fair Exchange Protocol Using Ring Architecture Model
|
Khill, Insoo |
|
2001 |
20 |
5 |
p. 422-439 18 p. |
artikel |
13 |
Proprietary Data: Eldorado in Cyber-Space
|
Bequai, August |
|
2001 |
20 |
5 |
p. 372-373 2 p. |
artikel |
14 |
Security in a Mobile World — is Bluetooth the Answer?
|
Barber, Richard |
|
2001 |
20 |
5 |
p. 374-379 6 p. |
artikel |
15 |
Security Views
|
Hancock, Bill |
|
2001 |
20 |
5 |
p. 348-363 16 p. |
artikel |
16 |
The Council of Europe Cyber-Crime Convention
|
Pounder, Chris |
|
2001 |
20 |
5 |
p. 380-383 4 p. |
artikel |