nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Automated network defence system unveiled
|
|
|
1998 |
1998 |
2 |
p. 5- 1 p. |
artikel |
2 |
Bull focuses on security
|
|
|
1998 |
1998 |
2 |
p. 5- 1 p. |
artikel |
3 |
Businesses wake up to software licensing laws
|
|
|
1998 |
1998 |
2 |
p. 3- 1 p. |
artikel |
4 |
Buyers beware
|
|
|
1998 |
1998 |
2 |
p. 5- 1 p. |
artikel |
5 |
Clinton now supports communications privacy!
|
Madsen, Wayne |
|
1998 |
1998 |
2 |
p. 7- 1 p. |
artikel |
6 |
Cyberterrorism — fact or fancy?
|
Pollitt, Mark M. |
|
1998 |
1998 |
2 |
p. 8-10 3 p. |
artikel |
7 |
Encryption accelerated
|
|
|
1998 |
1998 |
2 |
p. 6- 1 p. |
artikel |
8 |
Entrust forms partnerships
|
|
|
1998 |
1998 |
2 |
p. 3- 1 p. |
artikel |
9 |
Events
|
|
|
1998 |
1998 |
2 |
p. 20- 1 p. |
artikel |
10 |
Go ahead, visit those web sites, you can't get hurt… can you?
|
Rothfuss, James S. |
|
1998 |
1998 |
2 |
p. 11-15 5 p. |
artikel |
11 |
Hacking: Myth or menace, Part I
|
Blatchford, Clive |
|
1998 |
1998 |
2 |
p. 16-18 3 p. |
artikel |
12 |
Increases in virus growth
|
|
|
1998 |
1998 |
2 |
p. 2- 1 p. |
artikel |
13 |
Large companies to lead fight against Millennium Bug
|
|
|
1998 |
1998 |
2 |
p. 3- 1 p. |
artikel |
14 |
PC fingerprint security
|
|
|
1998 |
1998 |
2 |
p. 6- 1 p. |
artikel |
15 |
RSA moves into cable market
|
|
|
1998 |
1998 |
2 |
p. 4- 1 p. |
artikel |
16 |
Security giant moves to plug leaks in PC safety
|
|
|
1998 |
1998 |
2 |
p. 2- 1 p. |
artikel |
17 |
Security policies inadequate
|
|
|
1998 |
1998 |
2 |
p. 4- 1 p. |
artikel |
18 |
Sex, lies, and intrigue… in your own office
|
Wylie, Helen |
|
1998 |
1998 |
2 |
p. 19- 1 p. |
artikel |
19 |
Software wards off music pirates
|
|
|
1998 |
1998 |
2 |
p. 5- 1 p. |
artikel |