nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Advanced Analysis of Intrusion Detection Logs
|
|
|
2003 |
2003 |
6 |
p. 9-12 4 p. |
artikel |
2 |
Computer and Internet Fraud: A Risk Identification Overview
|
|
|
2003 |
2003 |
6 |
p. 6-9 4 p. |
artikel |
3 |
Corporate Cybercrime Trends
|
|
|
2003 |
2003 |
6 |
p. 4-6 3 p. |
artikel |
4 |
Events calendar
|
|
|
2003 |
2003 |
6 |
p. 20- 1 p. |
artikel |
5 |
Holistic Security: Why Doing More Can Cost You Less and Lower Your Risk
|
|
|
2003 |
2003 |
6 |
p. 13-15 3 p. |
artikel |
6 |
How Safe is your Business from Credit Card Fraud?
|
|
|
2003 |
2003 |
6 |
p. 15-16 2 p. |
artikel |
7 |
In brief
|
|
|
2003 |
2003 |
6 |
p. 2-3 2 p. |
artikel |
8 |
Information Age Crime
|
Codina, Rosa |
|
2003 |
2003 |
6 |
p. 1-2 2 p. |
artikel |
9 |
IP theft costs overtake virus losses
|
|
|
2003 |
2003 |
6 |
p. 3- 1 p. |
artikel |
10 |
Manual Link Analysis and Trace Back
|
|
|
2003 |
2003 |
6 |
p. 17-20 4 p. |
artikel |
11 |
New complex worm surfaces
|
|
|
2003 |
2003 |
6 |
p. 2-3 2 p. |
artikel |
12 |
Passport vulnerability posted
|
|
|
2003 |
2003 |
6 |
p. 3- 1 p. |
artikel |
13 |
Security operation centres hold most attack data
|
|
|
2003 |
2003 |
6 |
p. 3- 1 p. |
artikel |