nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Apple releases patch that brings new problems
|
Gengler, Barbara |
|
2000 |
2000 |
2 |
p. 5- 1 p. |
artikel |
2 |
Be prepared for a new form of Internet fraud
|
Phillippsohn, Steven |
|
2000 |
2000 |
2 |
p. 2- 1 p. |
artikel |
3 |
Building Trust Online
|
Ott, Rachael |
|
2000 |
2000 |
2 |
p. 10-12 3 p. |
artikel |
4 |
Clinton wants $2 billion to fight cyber-terrorism
|
Sterlicchi, John |
|
2000 |
2000 |
2 |
p. 6- 1 p. |
artikel |
5 |
Credit card fraud affects few users
|
Vu, Tran |
|
2000 |
2000 |
2 |
p. 2- 1 p. |
artikel |
6 |
Cyberattacks…US goes on the offensive
|
Gengler, Barbara |
|
2000 |
2000 |
2 |
p. 5- 1 p. |
artikel |
7 |
Detect and defuse security violations
|
|
|
2000 |
2000 |
2 |
p. 4- 1 p. |
artikel |
8 |
DVD hack distributors face court threat
|
Wehde, Ed |
|
2000 |
2000 |
2 |
p. 6- 1 p. |
artikel |
9 |
For Your Eyes Only: information security training
|
Tan, Laura |
|
2000 |
2000 |
2 |
p. 3- 1 p. |
artikel |
10 |
Hackers form security company
|
|
|
2000 |
2000 |
2 |
p. 1- 1 p. |
artikel |
11 |
Information Warfare: IT Security Professionals To Steer Clear
|
Madsen, Wayne |
|
2000 |
2000 |
2 |
p. 14-15 2 p. |
artikel |
12 |
Introduction to the New Old World of Netspionage
|
|
|
2000 |
2000 |
2 |
p. 18-19 2 p. |
artikel |
13 |
ISS provides customers with security knowledge
|
Black, Kevin |
|
2000 |
2000 |
2 |
p. 3-4 2 p. |
artikel |
14 |
IT managers aware of piracy
|
Bartram, Colin |
|
2000 |
2000 |
2 |
p. 3- 1 p. |
artikel |
15 |
Keep that spy out in the cold!
|
Dwan, Berni |
|
2000 |
2000 |
2 |
p. 7- 1 p. |
artikel |
16 |
On the Battlefield and in the Marketplace, Information Warfare is Much More Than Attacking Computers: Part 2 of 4
|
Luzwick, Perry |
|
2000 |
2000 |
2 |
p. 16-17 2 p. |
artikel |
17 |
Security remains a mystery for SMEs
|
|
|
2000 |
2000 |
2 |
p. 3- 1 p. |
artikel |
18 |
Senate Panel Suggests Teams To Penetrate Private Sector Computers
|
Madsen, Wayne |
|
2000 |
2000 |
2 |
p. 12-13 2 p. |
artikel |
19 |
The Changing Face of International Cryptography Policy
|
Herson, David |
|
2000 |
2000 |
2 |
p. 8-9 2 p. |
artikel |
20 |
US Army Web site hacked
|
|
|
2000 |
2000 |
2 |
p. 2- 1 p. |
artikel |
21 |
US Software Law May Affect UK Companies
|
Ollerenshaw, Zoe |
|
2000 |
2000 |
2 |
p. 13-14 2 p. |
artikel |
22 |
VIPER: an anti-virus solution for E-business
|
Kuipers, Caroline |
|
2000 |
2000 |
2 |
p. 4- 1 p. |
artikel |