nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A qualitative analysis of software security patterns
|
Halkidis, Spyros T. |
|
2006 |
25 |
5 |
p. 379-392 14 p. |
artikel |
2 |
Authentication delegation for subscription-based remote network services
|
Ma, Mingchao |
|
2006 |
25 |
5 |
p. 371-378 8 p. |
artikel |
3 |
Calender of Events
|
|
|
2006 |
25 |
5 |
p. EX1- 1 p. |
artikel |
4 |
Comparing Java and .NET security: Lessons learned and missed
|
Paul, Nathanael |
|
2006 |
25 |
5 |
p. 338-350 13 p. |
artikel |
5 |
Continuous auditing technologies and models: A discussion
|
Flowerday, S. |
|
2006 |
25 |
5 |
p. 325-331 7 p. |
artikel |
6 |
On Incident Handling and Response: A state-of-the-art approach
|
Mitropoulos, Sarandis |
|
2006 |
25 |
5 |
p. 351-370 20 p. |
artikel |
7 |
PING attack – How bad is it?
|
Kumar, Sanjeev |
|
2006 |
25 |
5 |
p. 332-337 6 p. |
artikel |
8 |
Security Views - Malware Update
|
|
|
2006 |
25 |
5 |
p. 317-324 8 p. |
artikel |
9 |
The changing winds of information security
|
Schultz, E. Eugene |
|
2006 |
25 |
5 |
p. 315-316 2 p. |
artikel |