nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Hot Query Bank approach to improve detection performance against SQL injection attacks
|
Chung, Yu-Chi |
|
2012 |
31 |
2 |
p. 233-248 16 p. |
artikel |
2 |
Coding for Penetration Testers
|
Leithner, Manuel |
|
2012 |
31 |
2 |
p. 252- 1 p. |
artikel |
3 |
Contents
|
|
|
2012 |
31 |
2 |
p. iii- 1 p. |
artikel |
4 |
Cyber Attacks
|
Bayuk, Jennifer L. |
|
2012 |
31 |
2 |
p. 251- 1 p. |
artikel |
5 |
Editorial
|
Spafford, Eugene H. |
|
2012 |
31 |
2 |
p. 149-150 2 p. |
artikel |
6 |
Formal security policy implementations in network firewalls
|
Macfarlane, Richard |
|
2012 |
31 |
2 |
p. 253-270 18 p. |
artikel |
7 |
HIPAA Privacy Rule compliance: An interpretive study using Norman’s action theory
|
Liginlal, Divakaran |
|
2012 |
31 |
2 |
p. 206-220 15 p. |
artikel |
8 |
IFC - Editorial Board
|
|
|
2012 |
31 |
2 |
p. IFC- 1 p. |
artikel |
9 |
Multiple-File Remote Data Checking for cloud storage
|
Xiao, Da |
|
2012 |
31 |
2 |
p. 192-205 14 p. |
artikel |
10 |
Performance of automated network vulnerability scanning at remediating security issues
|
Holm, Hannes |
|
2012 |
31 |
2 |
p. 164-175 12 p. |
artikel |
11 |
Security evaluation of biometric keys
|
Al-Assam, Hisham |
|
2012 |
31 |
2 |
p. 151-163 13 p. |
artikel |
12 |
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
|
Michael, Katina |
|
2012 |
31 |
2 |
p. 249-250 2 p. |
artikel |
13 |
Toward a general defense against kernel queue hooking attacks
|
Wei, Jinpeng |
|
2012 |
31 |
2 |
p. 176-191 16 p. |
artikel |
14 |
Unrealistic optimism on information security management
|
Rhee, Hyeun-Suk |
|
2012 |
31 |
2 |
p. 221-232 12 p. |
artikel |