nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Anyone for tennis?
|
|
|
2001 |
2001 |
3 |
p. 1- 1 p. |
artikel |
2 |
Auction sites attract fraud
|
|
|
2001 |
2001 |
3 |
p. 3-4 2 p. |
artikel |
3 |
Cybercrimes Of The 21st Century
|
Riem, Anthony |
|
2001 |
2001 |
3 |
p. 13-15 3 p. |
artikel |
4 |
Events Calendar
|
|
|
2001 |
2001 |
3 |
p. 20- 1 p. |
artikel |
5 |
Federal IT Systems Vulnerable To Attack
|
Gengler, Barbara |
|
2001 |
2001 |
3 |
p. 5- 1 p. |
artikel |
6 |
Ghost jailed for piracy
|
|
|
2001 |
2001 |
3 |
p. 3- 1 p. |
artikel |
7 |
Hacking Techniques
|
Barber, Richard |
|
2001 |
2001 |
3 |
p. 9-12 4 p. |
artikel |
8 |
If Most Of Your Revenue Is From E-Commerce, Then Cyber-Insurance Makes Sense
|
Luzwick, Perry |
|
2001 |
2001 |
3 |
p. 16-17 2 p. |
artikel |
9 |
InfoSec Basics and Models — Part 2
|
|
|
2001 |
2001 |
3 |
p. 18-19 2 p. |
artikel |
10 |
Internet faces BIND
|
|
|
2001 |
2001 |
3 |
p. 4- 1 p. |
artikel |
11 |
Internet-level virus scanning eliminates user error
|
|
|
2001 |
2001 |
3 |
p. 2- 1 p. |
artikel |
12 |
Managers fear IT breakdown
|
|
|
2001 |
2001 |
3 |
p. 2-3 2 p. |
artikel |
13 |
McAfee draws map of infestation
|
|
|
2001 |
2001 |
3 |
p. 2- 1 p. |
artikel |
14 |
No one is immune to privacy violations
|
|
|
2001 |
2001 |
3 |
p. 4- 1 p. |
artikel |
15 |
Script Kiddies Rule The Internet
|
|
|
2001 |
2001 |
3 |
p. 5- 1 p. |
artikel |
16 |
Smart card take-up set to double
|
|
|
2001 |
2001 |
3 |
p. 3- 1 p. |
artikel |
17 |
The Changing Face of International Cryptography Policy
|
Herson, David |
|
2001 |
2001 |
3 |
p. 7-8 2 p. |
artikel |
18 |
Things You Always Wanted to Know But Were Afraid to Ask!
|
Dwan, Berni |
|
2001 |
2001 |
3 |
p. 6- 1 p. |
artikel |