nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A third of fraudsters remain unpunished
|
|
|
2000 |
2000 |
7 |
p. 3-4 2 p. |
artikel |
2 |
Automatic two-way cookie filter
|
|
|
2000 |
2000 |
7 |
p. 5- 1 p. |
artikel |
3 |
A warning to readers
|
Dwan, Berni |
|
2000 |
2000 |
7 |
p. 8- 1 p. |
artikel |
4 |
Business risk and continuity planning addressed
|
|
|
2000 |
2000 |
7 |
p. 4- 1 p. |
artikel |
5 |
Centrally managed solution for mobile data security
|
|
|
2000 |
2000 |
7 |
p. 5- 1 p. |
artikel |
6 |
Central site needed to speed fight against viruses
|
|
|
2000 |
2000 |
7 |
p. 3- 1 p. |
artikel |
7 |
Commitment to combating software piracy drops 10%
|
|
|
2000 |
2000 |
7 |
p. 1-2 2 p. |
artikel |
8 |
iD2 to roll out time-stamping technology
|
|
|
2000 |
2000 |
7 |
p. 3- 1 p. |
artikel |
9 |
Implementing IPsec — making security work on VPNs, intranets and extranets
|
Dwan, Berni |
|
2000 |
2000 |
7 |
p. 9- 1 p. |
artikel |
10 |
Information security training bridges gap
|
|
|
2000 |
2000 |
7 |
p. 4- 1 p. |
artikel |
11 |
Information Warfare Attacks Can Be Against Trade Secrets and Intellectual Property. How Much is a Kilo of Your Information Worth?
|
Luzwick, Perry |
|
2000 |
2000 |
7 |
p. 15-17 3 p. |
artikel |
12 |
Intel develops new technology
|
Gengler, Barbara |
|
2000 |
2000 |
7 |
p. 6- 1 p. |
artikel |
13 |
Is it Cyber-Terrorism, Techno-Terrorism, or None of the Above?
|
|
|
2000 |
2000 |
7 |
p. 18-20 3 p. |
artikel |
14 |
Microsoft under fire
|
Wales, Elspeth |
|
2000 |
2000 |
7 |
p. 6-7 2 p. |
artikel |
15 |
Microsoft upgrades Outlook’s security
|
|
|
2000 |
2000 |
7 |
p. 2- 1 p. |
artikel |
16 |
NSA Chief Denies Massive Eavesdropping, Industrial Espionage
|
Madsen, Wayne |
|
2000 |
2000 |
7 |
p. 13-14 2 p. |
artikel |
17 |
Recent viruses cause little damage
|
|
|
2000 |
2000 |
7 |
p. 2-3 2 p. |
artikel |
18 |
Retailers protected against fraud
|
|
|
2000 |
2000 |
7 |
p. 5- 1 p. |
artikel |
19 |
Secure WAP-based commerce for Taiwan
|
|
|
2000 |
2000 |
7 |
p. 3- 1 p. |
artikel |
20 |
Senate considers expanded computer crime role
|
Madsen, Wayne |
|
2000 |
2000 |
7 |
p. 7- 1 p. |
artikel |
21 |
Software You Buy or Software You Rent?
|
Ollerenshaw, Zoe |
|
2000 |
2000 |
7 |
p. 12- 1 p. |
artikel |
22 |
The Changing Face of International Cryptography Policy
|
Herson, David |
|
2000 |
2000 |
7 |
p. 10-11 2 p. |
artikel |
23 |
Web security scanner available as free download
|
|
|
2000 |
2000 |
7 |
p. 5- 1 p. |
artikel |
24 |
Web site launched to combat fraud
|
|
|
2000 |
2000 |
7 |
p. 4- 1 p. |
artikel |