nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
College offers course in hacking
|
|
|
1997 |
1997 |
9 |
p. 5- 1 p. |
artikel |
2 |
Controversial anti-environmentalist Web page hacked
|
|
|
1997 |
1997 |
9 |
p. 2- 1 p. |
artikel |
3 |
Credit card file hacked
|
Breitrose, Charlie |
|
1997 |
1997 |
9 |
p. 6- 1 p. |
artikel |
4 |
Def Con V computer hacker's heaven, corporate job fair
|
Breitrose, Charlie |
|
1997 |
1997 |
9 |
p. 7-8 2 p. |
artikel |
5 |
Events
|
|
|
1997 |
1997 |
9 |
p. 16- 1 p. |
artikel |
6 |
From key escrow to key recovery: Variations on a theme
|
Wright, Marie |
|
1997 |
1997 |
9 |
p. 12-14 3 p. |
artikel |
7 |
Hackers attempt to disable Internet porn sites
|
|
|
1997 |
1997 |
9 |
p. 2- 1 p. |
artikel |
8 |
Hackers defend themselves at conference
|
|
|
1997 |
1997 |
9 |
p. 2- 1 p. |
artikel |
9 |
Hong Kong companies further targeted by BSA
|
|
|
1997 |
1997 |
9 |
p. 3- 1 p. |
artikel |
10 |
Intel chips to fix themselves
|
Breitrose, Charlie |
|
1997 |
1997 |
9 |
p. 6- 1 p. |
artikel |
11 |
Investigating computer crime
|
Sommer, Peter |
|
1997 |
1997 |
9 |
p. 15- 1 p. |
artikel |
12 |
National Security Agency cited for security problems
|
Madsen, Wayne |
|
1997 |
1997 |
9 |
p. 10-11 2 p. |
artikel |
13 |
Number of networks infected by Word Concept virus triples
|
|
|
1997 |
1997 |
9 |
p. 5- 1 p. |
artikel |
14 |
RCG IT partners Mercury Interactive for Year 2000 testing tools
|
|
|
1997 |
1997 |
9 |
p. 4- 1 p. |
artikel |
15 |
Reasoning and Formal Systems alliance for Year 2000 solutions
|
|
|
1997 |
1997 |
9 |
p. 4- 1 p. |
artikel |
16 |
Security Dynamics acquires Dynasoft
|
|
|
1997 |
1997 |
9 |
p. 5- 1 p. |
artikel |
17 |
Status of the Internet electronic commerce security market
|
Cresson Wood, Charles |
|
1997 |
1997 |
9 |
p. 8-9 2 p. |
artikel |
18 |
The huge costs of software piracy
|
|
|
1997 |
1997 |
9 |
p. 3- 1 p. |
artikel |