nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An Unappreciated Reason Why Information Security Policies Fail
|
Cresson Wood, Charles |
|
2000 |
2000 |
10 |
p. 13-14 2 p. |
artikel |
2 |
A Storm you Really Need to Weather
|
Dwan, Berni |
|
2000 |
2000 |
10 |
p. 11- 1 p. |
artikel |
3 |
Banks hacked on television
|
|
|
2000 |
2000 |
10 |
p. 4- 1 p. |
artikel |
4 |
Big Brother watches Office
|
|
|
2000 |
2000 |
10 |
p. 1- 1 p. |
artikel |
5 |
Chinese call for standards
|
|
|
2000 |
2000 |
10 |
p. 3- 1 p. |
artikel |
6 |
Democrats And Republicans On Security And Privacy: Virtually No Difference
|
Madsen, Wayne |
|
2000 |
2000 |
10 |
p. 8-9 2 p. |
artikel |
7 |
Dutch tighten surveillance
|
|
|
2000 |
2000 |
10 |
p. 3- 1 p. |
artikel |
8 |
FBI’s communications surveillance capabilities widen
|
Madsen, Wayne |
|
2000 |
2000 |
10 |
p. 16-17 2 p. |
artikel |
9 |
Hackers to be hired by Feds
|
|
|
2000 |
2000 |
10 |
p. 4- 1 p. |
artikel |
10 |
Hard-drive hygiene is key for corporate security
|
|
|
2000 |
2000 |
10 |
p. 5- 1 p. |
artikel |
11 |
IBM and Baltimore Technologies team up
|
|
|
2000 |
2000 |
10 |
p. 5-6 2 p. |
artikel |
12 |
If It’s Too Good To Be True, It Usually Is!
|
|
|
2000 |
2000 |
10 |
p. 18-19 2 p. |
artikel |
13 |
In cyberspace, no one can hear you leave
|
|
|
2000 |
2000 |
10 |
p. 3- 1 p. |
artikel |
14 |
Internet bank eludes fraudsters
|
|
|
2000 |
2000 |
10 |
p. 2-3 2 p. |
artikel |
15 |
Internet Patents
|
Barrett, Paula |
|
2000 |
2000 |
10 |
p. 10- 1 p. |
artikel |
16 |
Law firm suffers site cloning
|
|
|
2000 |
2000 |
10 |
p. 4- 1 p. |
artikel |
17 |
Mastercard delves into digital ID
|
Wehde, Ed |
|
2000 |
2000 |
10 |
p. 7- 1 p. |
artikel |
18 |
Metatags — The Latest Developments
|
Graham, Paul |
|
2000 |
2000 |
10 |
p. 12-13 2 p. |
artikel |
19 |
Online credit card fraud outpaces physical world
|
Donnelly, Allan |
|
2000 |
2000 |
10 |
p. 9- 1 p. |
artikel |
20 |
Pay-per-surf to be discontinued
|
|
|
2000 |
2000 |
10 |
p. 2- 1 p. |
artikel |
21 |
Philippine legal loophole frees Love Bug creator
|
|
|
2000 |
2000 |
10 |
p. 5- 1 p. |
artikel |
22 |
Puting security on the books
|
|
|
2000 |
2000 |
10 |
p. 3- 1 p. |
artikel |
23 |
Sonopress release hacker proof Safedisc
|
|
|
2000 |
2000 |
10 |
p. 5- 1 p. |
artikel |
24 |
Sophos squashes seaside bugs
|
|
|
2000 |
2000 |
10 |
p. 6- 1 p. |
artikel |
25 |
The enemy within
|
|
|
2000 |
2000 |
10 |
p. 2- 1 p. |
artikel |
26 |
Training for Cyber-War
|
Hook, Patrick |
|
2000 |
2000 |
10 |
p. 14-15 2 p. |
artikel |
27 |
Trojan targets Palm OS
|
|
|
2000 |
2000 |
10 |
p. 5- 1 p. |
artikel |
28 |
TRUSTe breaches own privacy policy
|
|
|
2000 |
2000 |
10 |
p. 6- 1 p. |
artikel |
29 |
UK companies ignore online enquiries
|
|
|
2000 |
2000 |
10 |
p. 2- 1 p. |
artikel |
30 |
US privacy organisations sink teeth into Carnivore
|
Wales, Elspeth |
|
2000 |
2000 |
10 |
p. 6-7 2 p. |
artikel |
31 |
Who is watching your back in cyberspace?
|
|
|
2000 |
2000 |
10 |
p. 5- 1 p. |
artikel |
32 |
Worm targets children
|
|
|
2000 |
2000 |
10 |
p. 4-5 2 p. |
artikel |