no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
AirSnort Tool Cracks WEP in 15 Minutes
|
|
|
2001 |
2001 |
9 |
p. 5- 1 p. |
article |
2 |
Code Blue worse than Code Red?
|
|
|
2001 |
2001 |
9 |
p. 4- 1 p. |
article |
3 |
DMCA silences Intel crypto researcher
|
|
|
2001 |
2001 |
9 |
p. 1- 1 p. |
article |
4 |
Dmitry update: the $2 million crypto geek
|
|
|
2001 |
2001 |
9 |
p. 2- 1 p. |
article |
5 |
Events Calendar
|
|
|
2001 |
2001 |
9 |
p. 20- 1 p. |
article |
6 |
High-end IT Security: No Longer a Distant Pipe Dream for SMEs
|
Robinson, Fiona |
|
2001 |
2001 |
9 |
p. 12-14 3 p. |
article |
7 |
Hotmail security has serious flaw
|
|
|
2001 |
2001 |
9 |
p. 2-3 2 p. |
article |
8 |
If Information Warfare Attacks are a Concern, Then Evaluate the Security Policy
|
Luzwick, Perry |
|
2001 |
2001 |
9 |
p. 16-18 3 p. |
article |
9 |
If You are an InfoSec Professional, You Must Also Be An InfoSec Writer — Part II
|
|
|
2001 |
2001 |
9 |
p. 18-20 3 p. |
article |
10 |
Judges rebel against usage monitoring
|
|
|
2001 |
2001 |
9 |
p. 3- 1 p. |
article |
11 |
Labor day virus is damp squib
|
|
|
2001 |
2001 |
9 |
p. 4- 1 p. |
article |
12 |
New era in hacktivism?
|
|
|
2001 |
2001 |
9 |
p. 4- 1 p. |
article |
13 |
Passwords: Use and Abuse
|
Yapp, Peter |
|
2001 |
2001 |
9 |
p. 14-16 3 p. |
article |
14 |
Report a bug, go to jail?
|
|
|
2001 |
2001 |
9 |
p. 3- 1 p. |
article |
15 |
Something New, Something Old
|
Dwan, Berni |
|
2001 |
2001 |
9 |
p. 7- 1 p. |
article |
16 |
The Changing Face of International Cryptography Policy
|
Herson, David |
|
2001 |
2001 |
9 |
p. 8-9 2 p. |
article |
17 |
The Draft Executive Order On Cyber-security Explained
|
Madsen, US Correspondent, Wayne |
|
2001 |
2001 |
9 |
p. 5-6 2 p. |
article |
18 |
This is Your Life
|
Henry, Katherine |
|
2001 |
2001 |
9 |
p. 10-11 2 p. |
article |
19 |
Voice copying program sparks fears over ID theft
|
|
|
2001 |
2001 |
9 |
p. 3-4 2 p. |
article |