nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An enhancement of timestamp-based password authentication scheme
|
Fan, Lei |
|
2002 |
21 |
7 |
p. 665-667 3 p. |
artikel |
2 |
Applying digital rights management systems to privacy rights management
|
Kenny, Steve |
|
2002 |
21 |
7 |
p. 648-664 17 p. |
artikel |
3 |
Bugbear
|
Armstrong, Andrew |
|
2002 |
21 |
7 |
p. 607-608 2 p. |
artikel |
4 |
Cyberterrorism?
|
Gordon, Sarah |
|
2002 |
21 |
7 |
p. 636-647 12 p. |
artikel |
5 |
Digest of recent IT security press coverage
|
|
|
2002 |
21 |
7 |
p. 629-633 5 p. |
artikel |
6 |
Events
|
|
|
2002 |
21 |
7 |
p. 634- 1 p. |
artikel |
7 |
Guide for authors
|
|
|
2002 |
21 |
7 |
p. 635- 1 p. |
artikel |
8 |
IFIP technical committee 11
|
|
|
2002 |
21 |
7 |
p. 669-671 3 p. |
artikel |
9 |
In brief
|
|
|
2002 |
21 |
7 |
p. 629-633 5 p. |
artikel |
10 |
International Board of Referees
|
|
|
2002 |
21 |
7 |
p. 635- 1 p. |
artikel |
11 |
Managed Security Services — new economy relic or wave of the future?
|
McKenna, Brian |
|
2002 |
21 |
7 |
p. 613-616 4 p. |
artikel |
12 |
Note from the Publishers
|
McKenna, Brian |
|
2002 |
21 |
7 |
p. 591- 1 p. |
artikel |
13 |
Security policy update
|
Pounder, Chris |
|
2002 |
21 |
7 |
p. 620-623 4 p. |
artikel |
14 |
Security Views
|
Schultz, Eugene |
|
2002 |
21 |
7 |
p. 581-590 10 p. |
artikel |
15 |
Spam, scams, chains, hoaxes and other junk mail
|
Hinde, Stephen |
|
2002 |
21 |
7 |
p. 592-606 15 p. |
artikel |
16 |
Technology and Electronic Communications Act 2000
|
Jayeju-akinsiku, Babatunde |
|
2002 |
21 |
7 |
p. 624-628 5 p. |
artikel |
17 |
The US Government— bigger and better information security?
|
Schultz, E.Eugene |
|
2002 |
21 |
7 |
p. 578-580 3 p. |
artikel |
18 |
Trends in academic research: vulnerabilities analysis and intrusion detection
|
Bishop, Matt |
|
2002 |
21 |
7 |
p. 609-612 4 p. |
artikel |
19 |
Vulnerabilities categories for intrusion detection systems
|
Venter, H.S. |
|
2002 |
21 |
7 |
p. 617-619 3 p. |
artikel |