nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Annual conference on control, audit & security of information systems
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
artikel |
2 |
A strange brew for Java
|
|
|
1998 |
1998 |
10 |
p. 2- 1 p. |
artikel |
3 |
Audit and security of sap r/3
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
artikel |
4 |
Biometrics 98
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
artikel |
5 |
Biometrics provide medical records security
|
|
|
1998 |
1998 |
10 |
p. 3- 1 p. |
artikel |
6 |
Company claims to eradicate millennium bug
|
|
|
1998 |
1998 |
10 |
p. 5- 1 p. |
artikel |
7 |
Compsec international '98
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
artikel |
8 |
Computer security conference and exhibition
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
artikel |
9 |
Disaster recovery facilities expanded in Docklands
|
|
|
1998 |
1998 |
10 |
p. 6- 1 p. |
artikel |
10 |
Holding resellers to ransom
|
Parry, Rex |
|
1998 |
1998 |
10 |
p. 15-17 3 p. |
artikel |
11 |
Infosecurity scotland 98
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
artikel |
12 |
Internet security masterclass
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
artikel |
13 |
Massive surge in quarantined E-mail
|
|
|
1998 |
1998 |
10 |
p. 3- 1 p. |
artikel |
14 |
Media vision indictments
|
Gengler, Barbara |
|
1998 |
1998 |
10 |
p. 7- 1 p. |
artikel |
15 |
Men prefer to fix disasters themselves
|
|
|
1998 |
1998 |
10 |
p. 3- 1 p. |
artikel |
16 |
Midland gets new network-based banking application
|
|
|
1998 |
1998 |
10 |
p. 4- 1 p. |
artikel |
17 |
Mission-critical server suites for Windows NT
|
|
|
1998 |
1998 |
10 |
p. 5- 1 p. |
artikel |
18 |
Network breaches: They are real
|
Hancock, Bill |
|
1998 |
1998 |
10 |
p. 8-11 4 p. |
artikel |
19 |
ONTRACK launches free Y2K audit software
|
|
|
1998 |
1998 |
10 |
p. 6- 1 p. |
artikel |
20 |
Resellers get comprehensive security solution
|
|
|
1998 |
1998 |
10 |
p. 4- 1 p. |
artikel |
21 |
SAP in $500 million lawsuit
|
Sterlicchi, John |
|
1998 |
1998 |
10 |
p. 7- 1 p. |
artikel |
22 |
Smart card security and applications
|
Dwan, Berni |
|
1998 |
1998 |
10 |
p. 18-19 2 p. |
artikel |
23 |
Survive! 10th annual business continuity conference and exhibition
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
artikel |
24 |
Tamper-resistant security for E-business applications
|
|
|
1998 |
1998 |
10 |
p. 5- 1 p. |
artikel |
25 |
Twelve reasons why people aren't responding to the Y2K challenge
|
Wood, Charles Cresson |
|
1998 |
1998 |
10 |
p. 12-14 3 p. |
artikel |
26 |
Unauthorized Web access a virus risk
|
|
|
1998 |
1998 |
10 |
p. 2- 1 p. |
artikel |
27 |
Users get direct access to anti-virus research centre
|
|
|
1998 |
1998 |
10 |
p. 6- 1 p. |
artikel |
28 |
Virus bulletin international conference '98
|
|
|
1998 |
1998 |
10 |
p. 20- 1 p. |
artikel |
29 |
Worldwide collaboration for secure military messaging
|
|
|
1998 |
1998 |
10 |
p. 4- 1 p. |
artikel |