nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Banking on digital ceritificates to prevent UK payment fraud
|
Arnfield, Robin |
|
2004 |
1 |
3 |
p. 16-18 3 p. |
artikel |
2 |
Basket cases
|
Jones, Bob |
|
2004 |
1 |
3 |
p. 36- 1 p. |
artikel |
3 |
Bug-fixed applications still insecure
|
McKenna, Brian |
|
2004 |
1 |
3 |
p. 6- 1 p. |
artikel |
4 |
CA launches co-managed VA and patch management service
|
McKenna, Brian |
|
2004 |
1 |
3 |
p. 5- 1 p. |
artikel |
5 |
Cisco and Trend Micro tighten collaboration around Sasser-like attacks
|
McKenna, Brian |
|
2004 |
1 |
3 |
p. 4- 1 p. |
artikel |
6 |
Cover story: up the ante on IP
|
Mathieson, SA |
|
2004 |
1 |
3 |
p. 20-22 3 p. |
artikel |
7 |
Cyber attacks on banks double from 2003
|
McKenna, Brian |
|
2004 |
1 |
3 |
p. 5- 1 p. |
artikel |
8 |
Dark age at drug firms
|
Bradbury, Danny |
|
2004 |
1 |
3 |
p. 32-34 3 p. |
artikel |
9 |
Finger(print) of fate
|
O'Halloran, Joe |
|
2004 |
1 |
3 |
p. 8- 1 p. |
artikel |
10 |
Hijacks on the information Highway
|
Moynihan, Niall |
|
2004 |
1 |
3 |
p. 44- 1 p. |
artikel |
11 |
HP exploits new bugs to fix its systems
|
Hilley, Sarah |
|
2004 |
1 |
3 |
p. 6- 1 p. |
artikel |
12 |
Industry calendar
|
|
|
2004 |
1 |
3 |
p. 48- 1 p. |
artikel |
13 |
Open on all sides, he cannot be attacked
|
Tomlinson, Gary |
|
2004 |
1 |
3 |
p. 42-43 2 p. |
artikel |
14 |
Privateer repels boarders
|
Everett, Cath |
|
2004 |
1 |
3 |
p. 24-26 3 p. |
artikel |
15 |
Racist spam on eve of EU elections
|
McKenna, Brian |
|
2004 |
1 |
3 |
p. 4- 1 p. |
artikel |
16 |
Rich broth may spoil
|
O'Halloran, Joe |
|
2004 |
1 |
3 |
p. 10- 1 p. |
artikel |
17 |
Secure coding — principles and practices
|
Blyth, Andrew |
|
2004 |
1 |
3 |
p. 46- 1 p. |
artikel |
18 |
Security managers getting act together?
|
Hilley, Sarah |
|
2004 |
1 |
3 |
p. 4- 1 p. |
artikel |
19 |
Smart IP protection
|
McKenna, Brian |
|
2004 |
1 |
3 |
p. 1- 1 p. |
artikel |
20 |
Storming London – Infosecurity Europe 2004
|
McKenna, Brian |
|
2004 |
1 |
3 |
p. 12-15 4 p. |
artikel |
21 |
The physics of information security
|
McKenna, Brian |
|
2004 |
1 |
3 |
p. 28-30 3 p. |
artikel |
22 |
The Pru gets smart with spam
|
|
|
2004 |
1 |
3 |
p. 6- 1 p. |
artikel |
23 |
The rocky road to reliable software
|
Grant, Ian |
|
2004 |
1 |
3 |
p. 38-41 4 p. |
artikel |
24 |
When you outsource to India, where does your data go? Not where you think…
|
Hilley, Sarah |
|
2004 |
1 |
3 |
p. 6- 1 p. |
artikel |