nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Banks publish Y2K checklist
|
|
|
1998 |
1998 |
5 |
p. 3- 1 p. |
artikel |
2 |
Copyright bill moves forward
|
|
|
1998 |
1998 |
5 |
p. 8- 1 p. |
artikel |
3 |
Encryption sellers crack US export laws
|
|
|
1998 |
1998 |
5 |
p. 6- 1 p. |
artikel |
4 |
Euro law seeks to hush up debates on security flaws
|
|
|
1998 |
1998 |
5 |
p. 8- 1 p. |
artikel |
5 |
Events
|
|
|
1998 |
1998 |
5 |
p. 20- 1 p. |
artikel |
6 |
Group offers guide around the software licence maze
|
|
|
1998 |
1998 |
5 |
p. 5- 1 p. |
artikel |
7 |
Hacking: Motivation and deterrence, part II
|
Hoath, Peter |
|
1998 |
1998 |
5 |
p. 17-19 3 p. |
artikel |
8 |
Insurers cover Y2K
|
|
|
1998 |
1998 |
5 |
p. 2- 1 p. |
artikel |
9 |
Java risks are hype, say experts
|
|
|
1998 |
1998 |
5 |
p. 6- 1 p. |
artikel |
10 |
Juvenile hacker charged for airport shenanigans
|
Edittech International, |
|
1998 |
1998 |
5 |
p. 4- 1 p. |
artikel |
11 |
Millennium solution for PCs
|
|
|
1998 |
1998 |
5 |
p. 3- 1 p. |
artikel |
12 |
Moving targets: Chip thefts continue
|
Szweda, Roy |
|
1998 |
1998 |
5 |
p. 14-16 3 p. |
artikel |
13 |
NEC, Fujitsu unveil computer security services
|
|
|
1998 |
1998 |
5 |
p. 5- 1 p. |
artikel |
14 |
Report on Australian internet security management
|
Rees, Frank |
|
1998 |
1998 |
5 |
p. 8- 1 p. |
artikel |
15 |
Reuters accused of software theft conspiracy
|
King, N. |
|
1998 |
1998 |
5 |
p. 9-10 2 p. |
artikel |
16 |
Scam financial services pose risks
|
|
|
1998 |
1998 |
5 |
p. 7- 1 p. |
artikel |
17 |
Teens hack German ISP
|
|
|
1998 |
1998 |
5 |
p. 4- 1 p. |
artikel |
18 |
The UK's new anti-fraud warlord
|
Essinger, James |
|
1998 |
1998 |
5 |
p. 11-13 3 p. |
artikel |
19 |
Wired world dangers rising, report warns
|
|
|
1998 |
1998 |
5 |
p. 7- 1 p. |
artikel |