nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Commercial use of cryptography in the shell companies
|
Mansfield, Nick |
|
1997 |
2 |
3 |
p. 18-20 3 p. |
artikel |
2 |
Introduction
|
Hardy, Gary |
|
1997 |
2 |
3 |
p. 1- 1 p. |
artikel |
3 |
Network security: Anything but bulletproof
|
Klaus, Christopher W. |
|
1997 |
2 |
3 |
p. 28-32 5 p. |
artikel |
4 |
Report highlights
|
|
|
1997 |
2 |
3 |
p. 2-7 6 p. |
artikel |
5 |
Security issues in today's corporate network
|
Sherwood, John |
|
1997 |
2 |
3 |
p. 8-17 10 p. |
artikel |
6 |
Should TTPs be licensed?
|
Walker, John |
|
1997 |
2 |
3 |
p. 21-27 7 p. |
artikel |
7 |
Strategic security for IP networks
|
Ranum, Marcus J. |
|
1997 |
2 |
3 |
p. 46-52 7 p. |
artikel |
8 |
The relevance of penetration testing to corporate network security
|
Hardy, Gary |
|
1997 |
2 |
3 |
p. 80-86 7 p. |
artikel |
9 |
Thinking about firewalls V2.0: Beyond perimeter security
|
Ranum, Marcus J |
|
1997 |
2 |
3 |
p. 33-45 13 p. |
artikel |
10 |
Unix network security
|
McNamarra, Roy |
|
1997 |
2 |
3 |
p. 66-79 14 p. |
artikel |
11 |
Windows NT security
|
White, Ian |
|
1997 |
2 |
3 |
p. 53-65 13 p. |
artikel |