nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adapting Public Key Infrastructures to the Mobile Environment
|
N T Trask |
|
2001 |
19 |
3 |
p. 76-80 5 p. |
artikel |
2 |
Adapting Public Key Infrastructures to the Mobile Environment
|
Trask, N T |
|
2001 |
19 |
3 |
p. 76-80 |
artikel |
3 |
Biometrics Real Identities for a Virtual World
|
M Rejman-Greene |
|
2001 |
19 |
3 |
p. 115-121 7 p. |
artikel |
4 |
Biometrics — Real Identities for a Virtual World
|
Rejman-Greene, M |
|
2001 |
19 |
3 |
p. 115-121 |
artikel |
5 |
Building on Rock Rather Than Sand
|
M Hogg |
|
2001 |
19 |
3 |
p. 11-22 12 p. |
artikel |
6 |
Building on Rock Rather Than Sand
|
Hogg, M |
|
2001 |
19 |
3 |
p. 11-22 |
artikel |
7 |
Concert IP Secure a Managed Firewall and VPN Service
|
G Shorrock |
|
2001 |
19 |
3 |
p. 99-106 8 p. |
artikel |
8 |
Concert IP Secure — a Managed Firewall and VPN Service
|
Shorrock, G |
|
2001 |
19 |
3 |
p. 99-106 |
artikel |
9 |
Editorial
|
John Regnault |
|
2001 |
19 |
3 |
p. 2-3 2 p. |
artikel |
10 |
Editorial
|
Regnault, John |
|
2001 |
19 |
3 |
p. 2-3 |
artikel |
11 |
Firewalls Evolve or Die
|
D J Gooch |
|
2001 |
19 |
3 |
p. 89-98 10 p. |
artikel |
12 |
Firewalls — Evolve or Die
|
Gooch, D J |
|
2001 |
19 |
3 |
p. 89-98 |
artikel |
13 |
Foreword
|
Chris Earnshaw |
|
2001 |
19 |
3 |
p. 1-1 1 p. |
artikel |
14 |
Foreword
|
Earnshaw, Chris |
|
2001 |
19 |
3 |
p. 1 |
artikel |
15 |
Information Assurance
|
C J Colwill |
|
2001 |
19 |
3 |
p. 107-114 8 p. |
artikel |
16 |
Information Assurance
|
Colwill, C J |
|
2001 |
19 |
3 |
p. 107-114 |
artikel |
17 |
Interworking between SDH and OTN-Based Transport Networks
|
A McGuire |
|
2001 |
19 |
3 |
p. 143-151 9 p. |
artikel |
18 |
Interworking between SDH and OTN-Based Transport Networks
|
McGuire, A |
|
2001 |
19 |
3 |
p. 143-151 |
artikel |
19 |
List of Acronyms
|
|
|
2001 |
19 |
3 |
p. 137-142 6 p. |
artikel |
20 |
List of Acronyms
|
|
|
2001 |
19 |
3 |
p. 137-142 |
artikel |
21 |
Public Key Infrastructures the Next Generation
|
K P Bosworth |
|
2001 |
19 |
3 |
p. 44-59 16 p. |
artikel |
22 |
Public Key Infrastructures — the Next Generation
|
Bosworth, K P |
|
2001 |
19 |
3 |
p. 44-59 |
artikel |
23 |
Recent BT Patents
|
|
|
2001 |
19 |
3 |
p. 153-153 1 p. |
artikel |
24 |
Recent BT Patents
|
|
|
2001 |
19 |
3 |
p. 153 |
artikel |
25 |
Secure Digital Archiving of High-Value Data
|
T Wright |
|
2001 |
19 |
3 |
p. 60-66 7 p. |
artikel |
26 |
Secure Digital Archiving of High-Value Data
|
Wright, T |
|
2001 |
19 |
3 |
p. 60-66 |
artikel |
27 |
Security Management Standard ISO 17799/BS 7799
|
M J Kenning |
|
2001 |
19 |
3 |
p. 132-136 5 p. |
artikel |
28 |
Security Management Standard — ISO 17799/BS 7799
|
Kenning, M J |
|
2001 |
19 |
3 |
p. 132-136 |
artikel |
29 |
TETRA Security
|
D W Parkinson |
|
2001 |
19 |
3 |
p. 81-88 8 p. |
artikel |
30 |
TETRA Security
|
Parkinson, D W |
|
2001 |
19 |
3 |
p. 81-88 |
artikel |
31 |
Transforming the 'Weakest Link' a Human/Computer Interaction Approach to Usable and Effective Security
|
M A Sasse |
|
2001 |
19 |
3 |
p. 122-131 10 p. |
artikel |
32 |
Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security
|
Sasse, M A |
|
2001 |
19 |
3 |
p. 122-131 |
artikel |
33 |
Using XML Security Mechanisms
|
A Selkirk |
|
2001 |
19 |
3 |
p. 35-43 9 p. |
artikel |
34 |
Using XML Security Mechanisms
|
Selkirk, A |
|
2001 |
19 |
3 |
p. 35-43 |
artikel |
35 |
Wireless Security
|
C W Blanchard |
|
2001 |
19 |
3 |
p. 67-75 9 p. |
artikel |
36 |
Wireless Security
|
Blanchard, C W |
|
2001 |
19 |
3 |
p. 67-75 |
artikel |
37 |
XML and Security
|
A Selkirk |
|
2001 |
19 |
3 |
p. 23-34 12 p. |
artikel |
38 |
XML and Security
|
Selkirk, A |
|
2001 |
19 |
3 |
p. 23-34 |
artikel |