nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An ethical hack?
|
Ford, Richard |
|
2005 |
|
4 |
p. 46- 1 p. |
artikel |
2 |
Bits and bridles for free speech
|
Bradbury, Danny |
|
2005 |
|
4 |
p. 36-39 4 p. |
artikel |
3 |
Business continuity plans survive contact on 7/7
|
|
|
2005 |
|
4 |
p. 5- 1 p. |
artikel |
4 |
Camouflage communications
|
Stibbe, Matthew |
|
2005 |
|
4 |
p. 26-28 3 p. |
artikel |
5 |
Can you trust your partner?
|
McKenna, Brian |
|
2006 |
|
4 |
p. 6- 1 p. |
artikel |
6 |
CISSPs pass new ISO benchmark
|
Hilley, Sarah |
|
2004 |
|
4 |
p. 5- 1 p. |
artikel |
7 |
City slickers use webmail to cheat their bosses
|
|
|
2004 |
|
4 |
p. 4- 1 p. |
artikel |
8 |
Continents drift closer
|
Huebner, Manfred |
|
2004 |
|
4 |
p. 40- 1 p. |
artikel |
9 |
Crypto to CSO
|
McKenna, Brian |
|
2004 |
|
4 |
p. 22-24 3 p. |
artikel |
10 |
Cyber-terrorist assault will happen, says conservative MP
|
McKenna, Brian |
|
2005 |
|
4 |
p. 5- 1 p. |
artikel |
11 |
Data protection in the new Europe
|
Mathieson, SA |
|
2004 |
|
4 |
p. 26-28 3 p. |
artikel |
12 |
Dig deep and look sideways
|
McKenna, Brian |
|
2005 |
|
4 |
p. 24-25 2 p. |
artikel |
13 |
Docs locks in demand
|
Sangani, Kris |
|
2005 |
|
4 |
p. 34-35 2 p. |
artikel |
14 |
eema Award for Excellence in Secure Electronic Business in partnership with Infosecurity Today
|
|
|
2006 |
|
4 |
p. 39- 1 p. |
artikel |
15 |
Fashion sharpens wireless risk
|
O'Halloran, Joe |
|
2004 |
|
4 |
p. 10- 1 p. |
artikel |
16 |
Finger points to biometric myths
|
Davis, Russ |
|
2004 |
|
4 |
p. 44-45 2 p. |
artikel |
17 |
Godfathers of the net
|
Everett, Cath |
|
2005 |
|
4 |
p. 7-8 2 p. |
artikel |
18 |
Goin' phishing?
|
Knight, William |
|
2004 |
|
4 |
p. 36-38 3 p. |
artikel |
19 |
Hacking matures as a criminal discipline
|
Mathieson, SA |
|
2006 |
|
4 |
p. 5- 1 p. |
artikel |
20 |
Hardware to blunt hack attack
|
Ward, Jim |
|
2004 |
|
4 |
p. 42-43 2 p. |
artikel |
21 |
How to make the most of IT
|
Everett, Cath |
|
2006 |
|
4 |
p. 24-26 3 p. |
artikel |
22 |
Industry calendar
|
|
|
2006 |
|
4 |
p. 48- 1 p. |
artikel |
23 |
Industry calendar
|
|
|
2005 |
|
4 |
p. 48- 1 p. |
artikel |
24 |
Information security can enable mobile working
|
Davis, Adrian |
|
2006 |
|
4 |
p. 42- 1 p. |
artikel |
25 |
Innocent code: a security wake-up call for web programmers
|
Blyth, Andrew |
|
2004 |
|
4 |
p. 43- 1 p. |
artikel |
26 |
(ISC)2 scholarship winner aims to please users
|
|
|
2006 |
|
4 |
p. 6- 1 p. |
artikel |
27 |
It's more than just the gear
|
Egan, Mark |
|
2005 |
|
4 |
p. 44-45 2 p. |
artikel |
28 |
IT strategy @ UK.gov
|
Grant, Ian |
|
2006 |
|
4 |
p. 14-18 5 p. |
artikel |
29 |
Keeping the wheels on
|
McKenna, Brian |
|
2006 |
|
4 |
p. 3- 1 p. |
artikel |
30 |
Lock up your data
|
Doyle, Eric |
|
2006 |
|
4 |
p. 31-33 3 p. |
artikel |
31 |
LSE calls for decentralised UK ID
|
Mathieson, SA |
|
2005 |
|
4 |
p. 6- 1 p. |
artikel |
32 |
Medical charts give way to smartcards
|
Mathieson, SA |
|
2006 |
|
4 |
p. 10-13 4 p. |
artikel |
33 |
Microsoft makes stealthy progress into security market
|
Hilley, Sarah |
|
2006 |
|
4 |
p. 6- 1 p. |
artikel |
34 |
Mobile madness: securing the endpoint
|
Salchow Jr, Ken |
|
2006 |
|
4 |
p. 41- 1 p. |
artikel |
35 |
Mozilla pock marked too
|
|
|
2004 |
|
4 |
p. 4- 1 p. |
artikel |
36 |
News in brief
|
|
|
2004 |
|
4 |
p. 11- 1 p. |
artikel |
37 |
News in brief
|
|
|
2005 |
|
4 |
p. 8- 1 p. |
artikel |
38 |
New worlds
|
McKenna, Brian |
|
2004 |
|
4 |
p. 1- 1 p. |
artikel |
39 |
Nokia and G&D connect to turn cellphones into credit cards
|
Grant, Ian |
|
2006 |
|
4 |
p. 4- 1 p. |
artikel |
40 |
Open culture breeds top security
|
Mathieson, SA |
|
2005 |
|
4 |
p. 20-22 3 p. |
artikel |
41 |
Oracle spreads into the middle
|
Everett, Cath |
|
2006 |
|
4 |
p. 34-36 3 p. |
artikel |
42 |
Peer-to-peer software exposes corporate data
|
Mathieson, SA |
|
2006 |
|
4 |
p. 5- 1 p. |
artikel |
43 |
PKI dies hard
|
McKenna, Brian |
|
2004 |
|
4 |
p. 10- 1 p. |
artikel |
44 |
Product roundup
|
|
|
2006 |
|
4 |
p. 43-45 3 p. |
artikel |
45 |
Product roundup
|
|
|
2005 |
|
4 |
p. 10-14 5 p. |
artikel |
46 |
Radware's knight's move
|
Everett, Cath |
|
2005 |
|
4 |
p. 30-32 3 p. |
artikel |
47 |
Researchers find way around Great Firewall of China
|
Mathieson, SA |
|
2006 |
|
4 |
p. 4- 1 p. |
artikel |
48 |
Resurgent market lifts Check Point
|
Everett, Cath |
|
2004 |
|
4 |
p. 30-32 3 p. |
artikel |
49 |
Russia-based attack averted but sign of dark things to come
|
McKenna, Brian |
|
2004 |
|
4 |
p. 6- 1 p. |
artikel |
50 |
Russia emerges into the shadows
|
Gudko, Alexander |
|
2006 |
|
4 |
p. 20-23 4 p. |
artikel |
51 |
Russian government deploys PKI to move money
|
|
|
2005 |
|
4 |
p. 5- 1 p. |
artikel |
52 |
Security architect — Marius Nacht
|
McKenna, Brian |
|
2005 |
|
4 |
p. 40-41 2 p. |
artikel |
53 |
Security managers de-stress to rock
|
|
|
2004 |
|
4 |
p. 46- 1 p. |
artikel |
54 |
Slack space
|
|
|
2006 |
|
4 |
p. 47- 1 p. |
artikel |
55 |
Stand up for the little guy
|
Gold, Steve |
|
2006 |
|
4 |
p. 37-38 2 p. |
artikel |
56 |
Staying power
|
James, Mick |
|
2006 |
|
4 |
p. 28-30 3 p. |
artikel |
57 |
Testing times for beleagured Internet Explorer on verge of Service Pack 2
|
Everett, Cath |
|
2004 |
|
4 |
p. 8- 1 p. |
artikel |
58 |
The enemy is us
|
Heiser, Jay |
|
2005 |
|
4 |
p. 42-43 2 p. |
artikel |
59 |
The spirit of Bletchley Park
|
McKenna, Brian |
|
2005 |
|
4 |
p. 3- 1 p. |
artikel |
60 |
Trends help the wise prepare
|
Zimmerman, Mark |
|
2006 |
|
4 |
p. 8-9 2 p. |
artikel |
61 |
Trusted computing — path to security or road to servitude?
|
Hilley, Sarah |
|
2004 |
|
4 |
p. 18-21 4 p. |
artikel |
62 |
UK gets all-EU traffic data retention
|
Mathieson, SA |
|
2005 |
|
4 |
p. 4- 1 p. |
artikel |
63 |
UK Health department overhauls patient records advisers
|
Grant, Ian |
|
2004 |
|
4 |
p. 4- 1 p. |
artikel |
64 |
UK MPs call for Computer Misuse Act upgrade
|
McKenna, Brian |
|
2004 |
|
4 |
p. 5- 1 p. |
artikel |
65 |
VPN security needs beefing up
|
Munro, Ken |
|
2006 |
|
4 |
p. 40- 1 p. |
artikel |
66 |
Web services need trimmed edges
|
Doyle, Eric |
|
2004 |
|
4 |
p. 14-16 3 p. |
artikel |
67 |
With map and compass through the threat landscape
|
Knight, William |
|
2005 |
|
4 |
p. 16-18 3 p. |
artikel |
68 |
Would you like source with your Bagle?
|
|
|
2004 |
|
4 |
p. 46- 1 p. |
artikel |
69 |
Yes, but…
|
Ford, Richard |
|
2006 |
|
4 |
p. 46- 1 p. |
artikel |