nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Anti-virus software reports on Windows registry changes
|
Zenkin, Denis |
|
2000 |
2000 |
6 |
p. 6- 1 p. |
artikel |
2 |
Biometrics secures Sun’s Java Card
|
Marshall, Elizabeth |
|
2000 |
2000 |
6 |
p. 5- 1 p. |
artikel |
3 |
Business continuity research highlights problems
|
|
|
2000 |
2000 |
6 |
p. 3- 1 p. |
artikel |
4 |
Changes proposed to FOIA
|
Madsen, Wayne |
|
2000 |
2000 |
6 |
p. 8- 1 p. |
artikel |
5 |
Data protection for Web sites
|
Allen, Mary |
|
2000 |
2000 |
6 |
p. 5- 1 p. |
artikel |
6 |
Entegrity and Gradient to merge
|
Christou, Peter |
|
2000 |
2000 |
6 |
p. 4- 1 p. |
artikel |
7 |
Event management and analysis for Windows
|
|
|
2000 |
2000 |
6 |
p. 5-6 2 p. |
artikel |
8 |
ICANN — Updated
|
Locke, Douglas |
|
2000 |
2000 |
6 |
p. 16-17 2 p. |
artikel |
9 |
Internet security education extends to UK
|
Henry, Katherine |
|
2000 |
2000 |
6 |
p. 4- 1 p. |
artikel |
10 |
Irish companies need to increase security standards
|
|
|
2000 |
2000 |
6 |
p. 2- 1 p. |
artikel |
11 |
Latest DTI security survey highlights a corporate inability to deal with non-technical security issues — Commentary from InterClear (UK)
|
|
|
2000 |
2000 |
6 |
p. 6- 1 p. |
artikel |
12 |
Making Data Secure
|
Parris, Richard |
|
2000 |
2000 |
6 |
p. 10-11 2 p. |
artikel |
13 |
Microsoft attracts Love virus
|
|
|
2000 |
2000 |
6 |
p. 3-4 2 p. |
artikel |
14 |
Motorola, Ericsson and Nokia
|
Gengler, Barbara |
|
2000 |
2000 |
6 |
p. 7- 1 p. |
artikel |
15 |
Name change for Racal
|
Provin, Cynthia |
|
2000 |
2000 |
6 |
p. 4- 1 p. |
artikel |
16 |
Net surveillance plan under scrutiny
|
Gengler, Barbara |
|
2000 |
2000 |
6 |
p. 7-8 2 p. |
artikel |
17 |
New algorithm to protect credit cards
|
|
|
2000 |
2000 |
6 |
p. 2-3 2 p. |
artikel |
18 |
New system assists anti-virus developers
|
Richardson, Karen |
|
2000 |
2000 |
6 |
p. 5- 1 p. |
artikel |
19 |
29% of large UK companies have no firewall protection
|
Coles, Robert |
|
2000 |
2000 |
6 |
p. 1-2 2 p. |
artikel |
20 |
PKI bridge enables interoperability
|
|
|
2000 |
2000 |
6 |
p. 2- 1 p. |
artikel |
21 |
Protect your laptop against theft
|
Burton, Terry |
|
2000 |
2000 |
6 |
p. 4-5 2 p. |
artikel |
22 |
RC5 to support wireless clients and servers
|
Mack, Richard |
|
2000 |
2000 |
6 |
p. 3- 1 p. |
artikel |
23 |
Security hole in E-commerce software
|
|
|
2000 |
2000 |
6 |
p. 3- 1 p. |
artikel |
24 |
Techno-Crimes and Criminal Justice Systems
|
|
|
2000 |
2000 |
6 |
p. 18-19 2 p. |
artikel |
25 |
Vendors take care!
|
Dwan, Berni |
|
2000 |
2000 |
6 |
p. 9- 1 p. |
artikel |
26 |
What the InfoSec Officer Should Know About the Future of the High-Technology Crime Investigative Profession and Law Enforcement Concerns
|
Kovacich, Gerald |
|
2000 |
2000 |
6 |
p. 12-15 4 p. |
artikel |