nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Distributed security services in Microsoft Windows 2000 (Windows NT 5.0: Protecting data in the enterprise
|
Pittaway, Glenn |
|
1998 |
3 |
4 |
p. 43-52 10 p. |
artikel |
2 |
Fundamentals of computer forensics
|
Bates, Jim |
|
1998 |
3 |
4 |
p. 75-78 4 p. |
artikel |
3 |
Implementing a generalized tool for network monitoring
|
Ranum, Marcus J |
|
1998 |
3 |
4 |
p. 53-64 12 p. |
artikel |
4 |
Introduction
|
Ciechanowicz, Chez |
|
1998 |
3 |
4 |
p. 1-2 2 p. |
artikel |
5 |
Networks — Where does the real threat lie?
|
McNamara, Roy |
|
1998 |
3 |
4 |
p. 65-74 10 p. |
artikel |
6 |
Network-versus host-based intrusion detection
|
Schepers, Filip |
|
1998 |
3 |
4 |
p. 32-42 11 p. |
artikel |
7 |
Report highlights
|
|
|
1998 |
3 |
4 |
p. 3-14 12 p. |
artikel |
8 |
Security monitoring in heterogeneous globally distributed environments
|
Venables, Phil |
|
1998 |
3 |
4 |
p. 15-31 17 p. |
artikel |
9 |
The Vulnerability Instantiation Methodology prototype
|
Barker, Robin |
|
1998 |
3 |
4 |
p. 79-86 8 p. |
artikel |