nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Al Qaeda buys cyber criminal expertise
|
Charlton, John |
|
2005 |
2005 |
3 |
p. 2- 1 p. |
artikel |
2 |
Choicepoint: sued, defrauded and share price quartered
|
|
|
2005 |
2005 |
3 |
p. 1- 1 p. |
artikel |
3 |
CIOs at the heart of IT all
|
Hinde, Stephen |
|
2005 |
2005 |
3 |
p. 15-17 3 p. |
artikel |
4 |
Close shave for Japanese bank
|
McKenna, Brian |
|
2005 |
2005 |
3 |
p. 2- 1 p. |
artikel |
5 |
Events calendar
|
|
|
2005 |
2005 |
3 |
p. 20- 1 p. |
artikel |
6 |
How much information do organizations throw away?
|
Jones, Andy |
|
2005 |
2005 |
3 |
p. 4-9 6 p. |
artikel |
7 |
In brief
|
|
|
2005 |
2005 |
3 |
p. 3- 1 p. |
artikel |
8 |
Incident analysis and recovery
|
Stephenson, Peter |
|
2005 |
2005 |
3 |
p. 17-19 3 p. |
artikel |
9 |
Looking out into a world of threat
|
Ashenden, Debi |
|
2005 |
2005 |
3 |
p. 13-15 3 p. |
artikel |
10 |
Police scour Internet for spammers to indict
|
Hilley, Sarah |
|
2005 |
2005 |
3 |
p. 3- 1 p. |
artikel |
11 |
Whose computer is it anyway? (part II)
|
Pemble, Matthew |
|
2005 |
2005 |
3 |
p. 9-13 5 p. |
artikel |
12 |
Windows XP SP2 release – the cull of the Bots
|
|
|
2005 |
2005 |
3 |
p. 20- 1 p. |
artikel |