nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Anti-virus software: on the internet frontline
|
|
|
1998 |
1998 |
6 |
p. 8-9 2 p. |
artikel |
2 |
Anti-virus vendors unite against security report
|
|
|
1998 |
1998 |
6 |
p. 5- 1 p. |
artikel |
3 |
Biometrics get a boost
|
Gengler, Barbara |
|
1998 |
1998 |
6 |
p. 11- 1 p. |
artikel |
4 |
CIA reports on Y2K
|
Gengler, Barbara |
|
1998 |
1998 |
6 |
p. 10- 1 p. |
artikel |
5 |
Data security laws discredited
|
|
|
1998 |
1998 |
6 |
p. 3- 1 p. |
artikel |
6 |
Events
|
|
|
1998 |
1998 |
6 |
p. 20- 1 p. |
artikel |
7 |
Firms exposed to hackers, black market data
|
|
|
1998 |
1998 |
6 |
p. 4- 1 p. |
artikel |
8 |
GlobeSet licenses Certicom cryptography
|
|
|
1998 |
1998 |
6 |
p. 7- 1 p. |
artikel |
9 |
Hackers breach US military systems
|
|
|
1998 |
1998 |
6 |
p. 4- 1 p. |
artikel |
10 |
HP wins crypto export for Japan
|
|
|
1998 |
1998 |
6 |
p. 6- 1 p. |
artikel |
11 |
Lotus upsets bug police
|
Sterlicchi, John |
|
1998 |
1998 |
6 |
p. 12- 1 p. |
artikel |
12 |
NSA hacks NASA
|
|
|
1998 |
1998 |
6 |
p. 4- 1 p. |
artikel |
13 |
Safeguarding the data warehouse
|
Harmon, Christopher |
|
1998 |
1998 |
6 |
p. 16-19 4 p. |
artikel |
14 |
Security firms prey on unsuspecting users
|
|
|
1998 |
1998 |
6 |
p. 3- 1 p. |
artikel |
15 |
Software auditing: More than a chore
|
Larsen, C.L. |
|
1998 |
1998 |
6 |
p. 13-15 3 p. |
artikel |
16 |
Standard c:cure
|
|
|
1998 |
1998 |
6 |
p. 2- 1 p. |
artikel |
17 |
Sun sidelines Elvis-Plus project
|
|
|
1998 |
1998 |
6 |
p. 6- 1 p. |
artikel |
18 |
Telecom fraud software looks and learns
|
|
|
1998 |
1998 |
6 |
p. 7- 1 p. |
artikel |
19 |
Trend Micro offers central anti-virus control
|
|
|
1998 |
1998 |
6 |
p. 5- 1 p. |
artikel |