nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Ami pro virus discovered by reflex magnetics
|
|
|
1996 |
1996 |
2 |
p. 6- 1 p. |
artikel |
2 |
Bipartisan support for medical records bill
|
Sterlicchi, John |
|
1996 |
1996 |
2 |
p. 9-10 2 p. |
artikel |
3 |
BSA calls for stronger copyright protection for EC
|
|
|
1996 |
1996 |
2 |
p. 4- 1 p. |
artikel |
4 |
Christmas present hackers
|
|
|
1996 |
1996 |
2 |
p. 3- 1 p. |
artikel |
5 |
Criminal justice act enhances data protection act
|
|
|
1996 |
1996 |
2 |
p. 5- 1 p. |
artikel |
6 |
E-mail bomb suspect arrested
|
|
|
1996 |
1996 |
2 |
p. 3- 1 p. |
artikel |
7 |
Free to existing customers anti-virus software for windows 95
|
|
|
1996 |
1996 |
2 |
p. 7- 1 p. |
artikel |
8 |
Green card means free satellite TV
|
|
|
1996 |
1996 |
2 |
p. 2- 1 p. |
artikel |
9 |
Hackers crack codes that scramble satellite broadcasts
|
McCormack, Michael |
|
1996 |
1996 |
2 |
p. 19- 1 p. |
artikel |
10 |
Highest piracy rates for Czech Republic and Slovakia
|
|
|
1996 |
1996 |
2 |
p. 4- 1 p. |
artikel |
11 |
Hong Kong firewall to protect government secrets
|
|
|
1996 |
1996 |
2 |
p. 2- 1 p. |
artikel |
12 |
Identify and analyze the threats with JSEAL8
|
|
|
1996 |
1996 |
2 |
p. 7- 1 p. |
artikel |
13 |
Intel puts the caps on chip speed
|
Kaneshige, Thomas |
|
1996 |
1996 |
2 |
p. 9- 1 p. |
artikel |
14 |
Labels help prevent counterfeiting
|
|
|
1996 |
1996 |
2 |
p. 8- 1 p. |
artikel |
15 |
Location-based authentication: Grounding cyberspace for better security
|
Denning, Dorothy E. |
|
1996 |
1996 |
2 |
p. 12-16 5 p. |
artikel |
16 |
Notes gets extra 24 bits crucial for security
|
|
|
1996 |
1996 |
2 |
p. 8- 1 p. |
artikel |
17 |
Poulsen escapes espionage charges
|
Sterlicchi, John |
|
1996 |
1996 |
2 |
p. 11- 1 p. |
artikel |
18 |
RAM-alert combats RAM raiding
|
|
|
1996 |
1996 |
2 |
p. 7- 1 p. |
artikel |
19 |
SecureNet '96
|
|
|
1996 |
1996 |
2 |
p. 6- 1 p. |
artikel |
20 |
Security puts microsoft in AtOnce's hands
|
Sterlicchi, John |
|
1996 |
1996 |
2 |
p. 10-11 2 p. |
artikel |
21 |
Siemens product gets ITSEC evaluation
|
|
|
1996 |
1996 |
2 |
p. 5- 1 p. |
artikel |
22 |
The information super highway — porn in the game?
|
Maybury, Nell |
|
1996 |
1996 |
2 |
p. 17-18 2 p. |
artikel |
23 |
The three-pronged deterrent
|
|
|
1996 |
1996 |
2 |
p. 8- 1 p. |
artikel |
24 |
Three lab assistants sacked for downloading porn
|
|
|
1996 |
1996 |
2 |
p. 5- 1 p. |
artikel |
25 |
Timing attacks: another threat to security
|
Madson, Amanda |
|
1996 |
1996 |
2 |
p. 10- 1 p. |
artikel |
26 |
Virus components give away secrets of their creation
|
|
|
1996 |
1996 |
2 |
p. 6- 1 p. |
artikel |