nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Cisco source code stolen – but should we care?
|
Hunter, Philip |
|
2004 |
2004 |
7 |
p. 11-12 2 p. |
artikel |
2 |
CISSPs pass new ISO benchmark
|
|
|
2004 |
2004 |
7 |
p. 3- 1 p. |
artikel |
3 |
Enemies within: the problem of insider attacks
|
Furnell, Steven |
|
2004 |
2004 |
7 |
p. 6-11 6 p. |
artikel |
4 |
Events calendar
|
|
|
2004 |
2004 |
7 |
p. 20- 1 p. |
artikel |
5 |
Identity fraud: the stealth threat to UK plc
|
Porter, David |
|
2004 |
2004 |
7 |
p. 4-6 3 p. |
artikel |
6 |
In brief
|
|
|
2004 |
2004 |
7 |
p. 2-3 2 p. |
artikel |
7 |
IT controls, financial reporting and fraud
|
Hinde, Steven |
|
2004 |
2004 |
7 |
p. 13-14 2 p. |
artikel |
8 |
Log correlation: Part 2
|
Forte, Dario |
|
2004 |
2004 |
7 |
p. 15-16 2 p. |
artikel |
9 |
PKI dies hard
|
McKenna, Brian |
|
2004 |
2004 |
7 |
p. 3- 1 p. |
artikel |
10 |
Russian zombie army turned back
|
McKenna, Brian |
|
2004 |
2004 |
7 |
p. 1-2 2 p. |
artikel |
11 |
Security managers getting act together?
|
|
|
2004 |
2004 |
7 |
p. 2- 1 p. |
artikel |
12 |
Using formal modeling to untangle security incidents
|
Stephenson, Peter |
|
2004 |
2004 |
7 |
p. 16-20 5 p. |
artikel |