nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Back to school
|
McKenna, Brian |
|
2006 |
|
5 |
p. 3- 1 p. |
artikel |
2 |
Beauty and the beast: hacking for pleasure and profit
|
Cremonini, Marco |
|
2004 |
|
5 |
p. 44- 1 p. |
artikel |
3 |
Biometrics – ready to be used in anger?
|
Everett, Cath |
|
2006 |
|
5 |
p. 30-32 3 p. |
artikel |
4 |
Computers that learn to spot the odd one out
|
Knight, William |
|
2006 |
|
5 |
p. 37-38 2 p. |
artikel |
5 |
Consultancy firms and the strategic future of infosec
|
McKenna, Brian |
|
2005 |
|
5 |
p. 3- 1 p. |
artikel |
6 |
Consultants wave integration flag
|
James, Mick |
|
2005 |
|
5 |
p. 28-31 4 p. |
artikel |
7 |
Denial of Service — a global picture from Cybertrust
|
|
|
2005 |
|
5 |
p. 16- 1 p. |
artikel |
8 |
Documentation dearth undermines open source security
|
Bradbury, Danny |
|
2004 |
|
5 |
p. 6- 1 p. |
artikel |
9 |
Don't leave your laptop with the gods
|
Munro, Ken |
|
2005 |
|
5 |
p. 46- 1 p. |
artikel |
10 |
Driving data protection at DaimlerChrysler
|
McKenna, Brian |
|
2004 |
|
5 |
p. 30- 1 p. |
artikel |
11 |
DTI to stimulate public clarity on IT security
|
Hilley, Sarah |
|
2004 |
|
5 |
p. 4- 1 p. |
artikel |
12 |
EMC buys RSA Security for $2bn. Have they gone mad?
|
Doyle, Eric |
|
2006 |
|
5 |
p. 8- 1 p. |
artikel |
13 |
Far from grim up North
|
Condon, Ron |
|
2006 |
|
5 |
p. 20-22 3 p. |
artikel |
14 |
FBI arrests young Turk and Moroccan for Zotob
|
McKenna, Brian |
|
2005 |
|
5 |
p. 4- 1 p. |
artikel |
15 |
Fingerprint biometrics — lessons from Belgium
|
Mathieson, SA |
|
2005 |
|
5 |
p. 8- 1 p. |
artikel |
16 |
Flight paths to security
|
Stibbe, Matthew |
|
2005 |
|
5 |
p. 33-35 3 p. |
artikel |
17 |
Gearing up for grid computing
|
Myerson, Judith M. |
|
2005 |
|
5 |
p. 22-25 4 p. |
artikel |
18 |
German police arrest eBay hi-jacker
|
McKenna, Brian |
|
2004 |
|
5 |
p. 4- 1 p. |
artikel |
19 |
Hot stocks to your inbox
|
Mathieson, SA |
|
2006 |
|
5 |
p. 10-13 4 p. |
artikel |
20 |
Industry calendar
|
|
|
2005 |
|
5 |
p. 48- 1 p. |
artikel |
21 |
IPSec bake off in San José
|
Zimmerman, Mark |
|
2005 |
|
5 |
p. 17- 1 p. |
artikel |
22 |
ISPs get tougher on spam
|
Hilley, Sarah |
|
2004 |
|
5 |
p. 4- 1 p. |
artikel |
23 |
ISS enters Big Blue
|
McKenna, Brian |
|
2006 |
|
5 |
p. 4- 1 p. |
artikel |
24 |
It's big and bold, but is it also Big Brother?
|
Grant, Ian |
|
2004 |
|
5 |
p. 40-42 3 p. |
artikel |
25 |
IT security – commoditized, badly
|
Honan, Brian |
|
2006 |
|
5 |
p. 41- 1 p. |
artikel |
26 |
It's political economy, stupid
|
McKenna, Brian |
|
2006 |
|
5 |
p. 28-29 2 p. |
artikel |
27 |
Keeping suppliers to their word
|
McKenna, Brian |
|
2004 |
|
5 |
p. 38-39 2 p. |
artikel |
28 |
Locked, cocked and ready to rock
|
Everett, Cath |
|
2004 |
|
5 |
p. 26-28 3 p. |
artikel |
29 |
Locking up the Grid
|
Knight, William |
|
2005 |
|
5 |
p. 18-20 3 p. |
artikel |
30 |
Microsoft and SP2: so much to do…
|
O'Halloran, Joe |
|
2004 |
|
5 |
p. 11- 1 p. |
artikel |
31 |
Microsoft ingests Whale
|
McKenna, Brian |
|
2006 |
|
5 |
p. 5- 1 p. |
artikel |
32 |
Mobile working drives switch to federated access rights
|
Knight, William |
|
2004 |
|
5 |
p. 22-25 4 p. |
artikel |
33 |
NetScreen for the masses
|
|
|
2004 |
|
5 |
p. 5- 1 p. |
artikel |
34 |
News in brief
|
|
|
2004 |
|
5 |
p. 8- 1 p. |
artikel |
35 |
Open Source Crypto for the world
|
Krempl, Stefan |
|
2005 |
|
5 |
p. 36-38 3 p. |
artikel |
36 |
Patches take priority over people
|
O'Halloran, Joe |
|
2004 |
|
5 |
p. 8- 1 p. |
artikel |
37 |
Perils posed by the mobile workforce
|
McKenna, Brian |
|
2004 |
|
5 |
p. 3- 1 p. |
artikel |
38 |
Pirotti's Risorgimento for EU information security
|
McKenna, Brian |
|
2005 |
|
5 |
p. 39-40 2 p. |
artikel |
39 |
Pity about the people
|
Heiser, Jay |
|
2006 |
|
5 |
p. 46- 1 p. |
artikel |
40 |
Police say new encrypted P2P network poses threat
|
Hilley, Sarah |
|
2004 |
|
5 |
p. 5- 1 p. |
artikel |
41 |
Policies peg cyberspace's frontiers
|
Kendrick, Rupert |
|
2004 |
|
5 |
p. 34-36 3 p. |
artikel |
42 |
Pricing privacy in a 24×7 world
|
Mathieson, SA |
|
2004 |
|
5 |
p. 14-17 4 p. |
artikel |
43 |
Product roundup
|
|
|
2006 |
|
5 |
p. 44-45 2 p. |
artikel |
44 |
Product roundup
|
|
|
2005 |
|
5 |
p. 12-14 3 p. |
artikel |
45 |
Safe to shelter under a Mac?
|
Munro, Ken |
|
2006 |
|
5 |
p. 40- 1 p. |
artikel |
46 |
Security technology fundamentally flawed, says ex White House CIO
|
McKenna, Brian |
|
2006 |
|
5 |
p. 9- 1 p. |
artikel |
47 |
Setting the record straight on secure networking
|
Roese, John |
|
2005 |
|
5 |
p. 44-45 2 p. |
artikel |
48 |
Slack space
|
|
|
2006 |
|
5 |
p. 47- 1 p. |
artikel |
49 |
Sophos: wise guys spread their bets
|
Everett, Cath |
|
2006 |
|
5 |
p. 33-35 3 p. |
artikel |
50 |
The trials of Cisco
|
Bradbury, Danny |
|
2005 |
|
5 |
p. 6-7 2 p. |
artikel |
51 |
Turning the worm
|
Bradbury, Danny |
|
2004 |
|
5 |
p. 10- 1 p. |
artikel |
52 |
UK banks sent out vulnerable PIN mailers
|
Mathieson, SA |
|
2005 |
|
5 |
p. 4- 1 p. |
artikel |
53 |
UK plans prison terms for personal data abuse
|
Mathieson, SA |
|
2006 |
|
5 |
p. 5- 1 p. |
artikel |
54 |
UK to track US on drug traceability
|
Grant, Ian |
|
2006 |
|
5 |
p. 6- 1 p. |
artikel |
55 |
Universities need lessons in IT security
|
Krempl, Stefan |
|
2006 |
|
5 |
p. 24-26 3 p. |
artikel |
56 |
War of the words
|
Bradbury, Danny |
|
2006 |
|
5 |
p. 14-17 4 p. |
artikel |
57 |
Web lets in new threats
|
Tuvey, Eldar |
|
2006 |
|
5 |
p. 43- 1 p. |
artikel |
58 |
Who bleeds, leads
|
Everett, Cath |
|
2005 |
|
5 |
p. 41-43 3 p. |
artikel |
59 |
Why we love to hate our telcos
|
Bradbury, Danny |
|
2004 |
|
5 |
p. 18-20 3 p. |
artikel |
60 |
Zotob and VoIP
|
O'Halloran, Joe |
|
2005 |
|
5 |
p. 10- 1 p. |
artikel |