nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An integral framework for information systems security management
|
Trèek, Denis |
|
2003 |
22 |
4 |
p. 337-360 24 p. |
artikel |
2 |
A taxonomy for information security technologies
|
Venter, H.S |
|
2003 |
22 |
4 |
p. 299-307 9 p. |
artikel |
3 |
Attackers hit Web hosting servers
|
Schultz, Eugene |
|
2003 |
22 |
4 |
p. 273-283 11 p. |
artikel |
4 |
Careless about privacy
|
Hinde, Stephen |
|
2003 |
22 |
4 |
p. 284-288 5 p. |
artikel |
5 |
Events
|
|
|
2003 |
22 |
4 |
p. 314- 1 p. |
artikel |
6 |
Evidence analysis
|
Wolfe, Hank |
|
2003 |
22 |
4 |
p. 289-291 3 p. |
artikel |
7 |
Guide for authors
|
|
|
2003 |
22 |
4 |
p. 315- 1 p. |
artikel |
8 |
IFIP technical committee 11
|
|
|
2003 |
22 |
4 |
p. 361-363 3 p. |
artikel |
9 |
International Board of Referees
|
|
|
2003 |
22 |
4 |
p. 315- 1 p. |
artikel |
10 |
Is the mouse click mighty enough to bring society to its knees?
|
Bhalla, Neelam |
|
2003 |
22 |
4 |
p. 322-336 15 p. |
artikel |
11 |
Methods for preventing unauthorized software distribution
|
Peyravian, Mohammad |
|
2003 |
22 |
4 |
p. 316-321 6 p. |
artikel |
12 |
The role of criminal profiling in the computer forensics process
|
Rogers, Marc |
|
2003 |
22 |
4 |
p. 292-298 7 p. |
artikel |
13 |
Why can’t Microsoft stay out of the InfoSec headlines?
|
Schultz, E.Eugene |
|
2003 |
22 |
4 |
p. 270-272 3 p. |
artikel |
14 |
Why we need a new definition of information security
|
Anderson, James M. |
|
2003 |
22 |
4 |
p. 308-313 6 p. |
artikel |