nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of Recent Articles and Literature
|
Ecclestone, Rachel |
|
2001 |
20 |
8 |
p. 684-687 4 p. |
artikel |
2 |
A comparison of Intrusion Detection systems
|
Biermann, E |
|
2001 |
20 |
8 |
p. 676-683 8 p. |
artikel |
3 |
Book Reviews
|
Ecclestone, Rachel |
|
2001 |
20 |
8 |
p. 688- 1 p. |
artikel |
4 |
Book Reviews
|
Ecclestone, Rachel |
|
2001 |
20 |
8 |
p. 688- 1 p. |
artikel |
5 |
Calendar
|
|
|
2001 |
20 |
8 |
p. 689-690 2 p. |
artikel |
6 |
Computer crimes: theorizing about the enemy within
|
Dhillon, Gurpreet |
|
2001 |
20 |
8 |
p. 715-723 9 p. |
artikel |
7 |
Cryptography Regulations for E-commerce and Digital Rights Management.
|
TORRUBIA, Andres |
|
2001 |
20 |
8 |
p. 724-738 15 p. |
artikel |
8 |
From The Editor
|
Hancock, Bill |
|
2001 |
20 |
8 |
p. 640-642 3 p. |
artikel |
9 |
Guide for Authors
|
|
|
2001 |
20 |
8 |
p. 742- 1 p. |
artikel |
10 |
Guidelines for the Protecting the Corporate against Viruses
|
Zenkin, Denis |
|
2001 |
20 |
8 |
p. 671-675 5 p. |
artikel |
11 |
IFIP Technical Committee 11
|
|
|
2001 |
20 |
8 |
p. 739-741 3 p. |
artikel |
12 |
If you can meet with triumph and disaster and treat those two impostors just the sameā¦
|
Hinde, Stephen |
|
2001 |
20 |
8 |
p. 657-666 10 p. |
artikel |
13 |
International Board of Referees
|
|
|
2001 |
20 |
8 |
p. 691-692 2 p. |
artikel |
14 |
Security Views
|
Hancock, Bill |
|
2001 |
20 |
8 |
p. 643-656 14 p. |
artikel |
15 |
The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model
|
Aron, Joan L. |
|
2001 |
20 |
8 |
p. 693-714 22 p. |
artikel |
16 |
What Do The Recent Terrorist Attacks Mean For The American Information Security Profession?
|
Cresson Wood, Charles |
|
2001 |
20 |
8 |
p. 667-670 4 p. |
artikel |