nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Addressing global ID management challenges
|
Gordon, Gary R. |
|
2009 |
2009 |
6 |
p. 7-10 4 p. |
artikel |
2 |
Calendar
|
|
|
2009 |
2009 |
6 |
p. 20- 1 p. |
artikel |
3 |
Cloud computing – a question of trust
|
|
|
2009 |
2009 |
6 |
p. 1- 1 p. |
artikel |
4 |
Cloud computing – A question of trust
|
Everett, Catherine |
|
2009 |
2009 |
6 |
p. 5-7 3 p. |
artikel |
5 |
Congress introduces PASS ID bill
|
|
|
2009 |
2009 |
6 |
p. 3- 1 p. |
artikel |
6 |
Editorial
|
Bradbury, Danny |
|
2009 |
2009 |
6 |
p. 2- 1 p. |
artikel |
7 |
Government unveils Hathaway review
|
|
|
2009 |
2009 |
6 |
p. 1- 1 p. |
artikel |
8 |
Hacking the hackers
|
Mansfield-Devine, Steve |
|
2009 |
2009 |
6 |
p. 10-13 4 p. |
artikel |
9 |
In brief
|
|
|
2009 |
2009 |
6 |
p. 4- 1 p. |
artikel |
10 |
Industry to Google: encrypt your cloud
|
|
|
2009 |
2009 |
6 |
p. 3- 1 p. |
artikel |
11 |
Open Group publishes risk management guidance
|
|
|
2009 |
2009 |
6 |
p. 3- 1 p. |
artikel |
12 |
Secure ecommerce web application design principles, beyond PCI DSS
|
Hartley, Dave |
|
2009 |
2009 |
6 |
p. 13-17 5 p. |
artikel |
13 |
The myth of the information security makeover
|
Goucher, Wendy |
|
2009 |
2009 |
6 |
p. 18-19 2 p. |
artikel |
14 |
Twitter comes under security scrutiny
|
|
|
2009 |
2009 |
6 |
p. 20- 1 p. |
artikel |