nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Anti-virus solution for firewalls
|
Zenkin, Denis |
|
2000 |
2000 |
5 |
p. 6- 1 p. |
artikel |
2 |
Automatic fax security
|
|
|
2000 |
2000 |
5 |
p. 5-6 2 p. |
artikel |
3 |
Company wins legal fight in US on spam
|
Hill, Pamela |
|
2000 |
2000 |
5 |
p. 3- 1 p. |
artikel |
4 |
Continuous Internet monitoring for fraud protection
|
|
|
2000 |
2000 |
5 |
p. 6- 1 p. |
artikel |
5 |
Encryption needed to secure video conferencing
|
|
|
2000 |
2000 |
5 |
p. 2-3 2 p. |
artikel |
6 |
Fraud risk training course
|
Findlay-Wilson, Louise |
|
2000 |
2000 |
5 |
p. 3- 1 p. |
artikel |
7 |
Hacker pleads guilty
|
|
|
2000 |
2000 |
5 |
p. 4-5 2 p. |
artikel |
8 |
(In)Famous Predictions
|
Luzwick, Perry |
|
2000 |
2000 |
5 |
p. 16-17 2 p. |
artikel |
9 |
Internet-based insider trading
|
Gengler, Barbara |
|
2000 |
2000 |
5 |
p. 7- 1 p. |
artikel |
10 |
Internet users fear their identities may be stolen
|
|
|
2000 |
2000 |
5 |
p. 2- 1 p. |
artikel |
11 |
Israeli sites 28% vulnerable
|
|
|
2000 |
2000 |
5 |
p. 5- 1 p. |
artikel |
12 |
Microsoft Outlook attracts more worms
|
|
|
2000 |
2000 |
5 |
p. 1- 1 p. |
artikel |
13 |
$15 million funding to combat hackers
|
Browne, Ray |
|
2000 |
2000 |
5 |
p. 5- 1 p. |
artikel |
14 |
New security alliance
|
Gengler, Barbara |
|
2000 |
2000 |
5 |
p. 7- 1 p. |
artikel |
15 |
60% of UK companies have suffered a security breach
|
|
|
2000 |
2000 |
5 |
p. 4- 1 p. |
artikel |
16 |
Online Dispute Resolution: Review of Initiatives Worldwide
|
Ott, Rachael |
|
2000 |
2000 |
5 |
p. 13-15 3 p. |
artikel |
17 |
PKI revenues set to grow
|
Rao, Krishna |
|
2000 |
2000 |
5 |
p. 3-4 2 p. |
artikel |
18 |
Privacy Issues Re-emerge
|
Madsen, Wayne |
|
2000 |
2000 |
5 |
p. 15- 1 p. |
artikel |
19 |
Roll up your sleeves and get checking!
|
Dwan, Berni |
|
2000 |
2000 |
5 |
p. 8- 1 p. |
artikel |
20 |
SmartGate extends the corporate firewall
|
|
|
2000 |
2000 |
5 |
p. 6- 1 p. |
artikel |
21 |
Techno-Crimes and Criminal Justice Systems
|
|
|
2000 |
2000 |
5 |
p. 18-19 2 p. |
artikel |
22 |
The Changing Face of International Cryptography Policy
|
Herson, David |
|
2000 |
2000 |
5 |
p. 9-10 2 p. |
artikel |
23 |
The Double-Edged Sword of the Net: Turning E-Porn into E-Productivity
|
Draycott, David |
|
2000 |
2000 |
5 |
p. 11-12 2 p. |
artikel |
24 |
Universal security server for E-commerce
|
McDermott, Paul |
|
2000 |
2000 |
5 |
p. 5- 1 p. |
artikel |
25 |
Web hotline launched for safe Internet use
|
Jansen, Ton |
|
2000 |
2000 |
5 |
p. 3- 1 p. |
artikel |
26 |
Worm attempts to call the 911 emergency service
|
Wee, Yunsun |
|
2000 |
2000 |
5 |
p. 2- 1 p. |
artikel |