nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A distributed systems approach to secure Internet mail
|
Machanick, Philip |
|
2005 |
24 |
6 |
p. 492-499 8 p. |
artikel |
2 |
A novel digital image watermarking scheme based on the vector quantization technique
|
Wu, Hsien-Chu |
|
2005 |
24 |
6 |
p. 460-471 12 p. |
artikel |
3 |
Can critical infrastructures rely on the Internet?
|
Fischer, W. |
|
2005 |
24 |
6 |
p. 485-491 7 p. |
artikel |
4 |
Host intrusion prevention: Part of the operating system or on top of the operating system?
|
Hofmeyr, S. |
|
2005 |
24 |
6 |
p. 440-442 3 p. |
artikel |
5 |
Improvement on the flexible tree-based key management framework
|
Hwang, Min-Shiang |
|
2005 |
24 |
6 |
p. 500-504 5 p. |
artikel |
6 |
Information Security Governance – Compliance management vs operational management
|
von Solms, S.H. (Basie) |
|
2005 |
24 |
6 |
p. 443-447 5 p. |
artikel |
7 |
Information security policy's impact on reporting security incidents
|
Wiant, Terry L. |
|
2005 |
24 |
6 |
p. 448-459 12 p. |
artikel |
8 |
Security views
|
Schultz, E. |
|
2005 |
24 |
6 |
p. 427-436 10 p. |
artikel |
9 |
Telecom fraud: The cost of doing nothing just went up
|
Pollard, C. |
|
2005 |
24 |
6 |
p. 437-439 3 p. |
artikel |
10 |
The human factor in security
|
Schultz, Eugene |
|
2005 |
24 |
6 |
p. 425-426 2 p. |
artikel |
11 |
The insider threat to information systems and the effectiveness of ISO17799
|
Theoharidou, Marianthi |
|
2005 |
24 |
6 |
p. 472-484 13 p. |
artikel |