nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Computer security for fun and profit
|
Wolfe, Hank |
|
2004 |
2004 |
4 |
p. 4-5 2 p. |
artikel |
2 |
EC called on to protect outsourced data
|
|
|
2004 |
2004 |
4 |
p. 3- 1 p. |
artikel |
3 |
Events calender
|
|
|
2004 |
2004 |
4 |
p. 20- 1 p. |
artikel |
4 |
Firewall worm debuts new risks
|
|
|
2004 |
2004 |
4 |
p. 1-2 2 p. |
artikel |
5 |
Identity theft
|
Dwan, Berni |
|
2004 |
2004 |
4 |
p. 14-17 4 p. |
artikel |
6 |
In brief
|
|
|
2004 |
2004 |
4 |
p. 2-3 2 p. |
artikel |
7 |
London police to form intelligence cell with companies
|
|
|
2004 |
2004 |
4 |
p. 1- 1 p. |
artikel |
8 |
Netsky & Bagle dominate virus top 10 in March
|
|
|
2004 |
2004 |
4 |
p. 3- 1 p. |
artikel |
9 |
Nigerian fraudster jailed
|
|
|
2004 |
2004 |
4 |
p. 3- 1 p. |
artikel |
10 |
Policy domain mapping
|
Stephenson, Peter |
|
2004 |
2004 |
4 |
p. 17-20 4 p. |
artikel |
11 |
The future of phishing
|
Tuliani, Jonathon |
|
2004 |
2004 |
4 |
p. 11- 1 p. |
artikel |
12 |
The transmutation of GIGO and the cult of assumption
|
Hinde, Steven |
|
2004 |
2004 |
4 |
p. 12-13 2 p. |
artikel |
13 |
UK Post Office links to ATM network with Thales' encryption technology
|
McKenna, Brian |
|
2004 |
2004 |
4 |
p. 2-3 2 p. |
artikel |
14 |
Using security
|
Furnell, Steven M |
|
2004 |
2004 |
4 |
p. 6-10 5 p. |
artikel |