nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AirSnort Tool Cracks WEP in 15 Minutes
|
|
|
2001 |
2001 |
9 |
p. 5- 1 p. |
artikel |
2 |
Code Blue worse than Code Red?
|
|
|
2001 |
2001 |
9 |
p. 4- 1 p. |
artikel |
3 |
DMCA silences Intel crypto researcher
|
|
|
2001 |
2001 |
9 |
p. 1- 1 p. |
artikel |
4 |
Dmitry update: the $2 million crypto geek
|
|
|
2001 |
2001 |
9 |
p. 2- 1 p. |
artikel |
5 |
Events Calendar
|
|
|
2001 |
2001 |
9 |
p. 20- 1 p. |
artikel |
6 |
High-end IT Security: No Longer a Distant Pipe Dream for SMEs
|
Robinson, Fiona |
|
2001 |
2001 |
9 |
p. 12-14 3 p. |
artikel |
7 |
Hotmail security has serious flaw
|
|
|
2001 |
2001 |
9 |
p. 2-3 2 p. |
artikel |
8 |
If Information Warfare Attacks are a Concern, Then Evaluate the Security Policy
|
Luzwick, Perry |
|
2001 |
2001 |
9 |
p. 16-18 3 p. |
artikel |
9 |
If You are an InfoSec Professional, You Must Also Be An InfoSec Writer — Part II
|
|
|
2001 |
2001 |
9 |
p. 18-20 3 p. |
artikel |
10 |
Judges rebel against usage monitoring
|
|
|
2001 |
2001 |
9 |
p. 3- 1 p. |
artikel |
11 |
Labor day virus is damp squib
|
|
|
2001 |
2001 |
9 |
p. 4- 1 p. |
artikel |
12 |
New era in hacktivism?
|
|
|
2001 |
2001 |
9 |
p. 4- 1 p. |
artikel |
13 |
Passwords: Use and Abuse
|
Yapp, Peter |
|
2001 |
2001 |
9 |
p. 14-16 3 p. |
artikel |
14 |
Report a bug, go to jail?
|
|
|
2001 |
2001 |
9 |
p. 3- 1 p. |
artikel |
15 |
Something New, Something Old
|
Dwan, Berni |
|
2001 |
2001 |
9 |
p. 7- 1 p. |
artikel |
16 |
The Changing Face of International Cryptography Policy
|
Herson, David |
|
2001 |
2001 |
9 |
p. 8-9 2 p. |
artikel |
17 |
The Draft Executive Order On Cyber-security Explained
|
Madsen, US Correspondent, Wayne |
|
2001 |
2001 |
9 |
p. 5-6 2 p. |
artikel |
18 |
This is Your Life
|
Henry, Katherine |
|
2001 |
2001 |
9 |
p. 10-11 2 p. |
artikel |
19 |
Voice copying program sparks fears over ID theft
|
|
|
2001 |
2001 |
9 |
p. 3-4 2 p. |
artikel |