nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Air traffic IT staff race against time
|
|
|
1998 |
1998 |
3 |
p. 2- 1 p. |
artikel |
2 |
Argentine software pirates rest easy
|
|
|
1998 |
1998 |
3 |
p. 3- 1 p. |
artikel |
3 |
Computer fraud set to rise
|
|
|
1998 |
1998 |
3 |
p. 5- 1 p. |
artikel |
4 |
Computer hacking, myth or menace, part II
|
Blatchford, Clive |
|
1998 |
1998 |
3 |
p. 16-19 4 p. |
artikel |
5 |
Events
|
|
|
1998 |
1998 |
3 |
p. 20- 1 p. |
artikel |
6 |
Leap day 2000 poses problems
|
|
|
1998 |
1998 |
3 |
p. 3- 1 p. |
artikel |
7 |
Peace virus infects excel
|
|
|
1998 |
1998 |
3 |
p. 3- 1 p. |
artikel |
8 |
Re-shuffling priorities — economic crises & IT security in Japan
|
Szweda, Roy |
|
1998 |
1998 |
3 |
p. 9-10 2 p. |
artikel |
9 |
Screen saver helps PCs catch thieves
|
|
|
1998 |
1998 |
3 |
p. 4- 1 p. |
artikel |
10 |
Security device helps foil business phone taps
|
|
|
1998 |
1998 |
3 |
p. 4- 1 p. |
artikel |
11 |
Security mouse patrols your desktop
|
|
|
1998 |
1998 |
3 |
p. 4- 1 p. |
artikel |
12 |
Shred of evidence
|
|
|
1998 |
1998 |
3 |
p. 4- 1 p. |
artikel |
13 |
Taking a peek over a fraud investigator's shoulder
|
Wylie, Helen |
|
1998 |
1998 |
3 |
p. 6-8 3 p. |
artikel |
14 |
The importance of IT security
|
Parkin, Roderick K. |
|
1998 |
1998 |
3 |
p. 12-15 4 p. |
artikel |
15 |
Trade secrets in software design and logic
|
Rees, Frank |
|
1998 |
1998 |
3 |
p. 11- 1 p. |
artikel |
16 |
US crypto policy lacks international support
|
|
|
1998 |
1998 |
3 |
p. 5- 1 p. |
artikel |