nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Comparison of RealSecure and NetRanger
|
Sample, Char |
|
1999 |
|
4 |
p. 9-12 |
artikel |
2 |
Advances in Cryptography
|
Poore, Ralph Spencer |
|
2003 |
|
4 |
p. 6-11 |
artikel |
3 |
A Guide to NetWare 5 Security and Control
|
Dykman, Charlene A. |
|
2000 |
|
4 |
p. 1-16 |
artikel |
4 |
“A Little Neglect May Breed Mischief …”
|
O'Hanley, Rich |
|
2003 |
|
4 |
p. 2-5 |
artikel |
5 |
A New Approach to Security: Learning from Immunology
|
Hofmeyr, Steven |
|
2003 |
|
4 |
p. 29-35 |
artikel |
6 |
An Integrated Approach to Security on Demand in ATM Networks
|
Schumacher, H. J. |
|
1998 |
|
4 |
p. 10-21 |
artikel |
7 |
Anonymity on the Internet: ACLU of Georgia v. Miller
|
Freeman, Edward H. |
|
2000 |
|
4 |
p. 1-6 |
artikel |
8 |
A Structured Approach to Incident Postmortems
|
Stephenson, Peter |
|
2003 |
|
4 |
p. 50-56 |
artikel |
9 |
Attorney—Client Privilege and Electronic Data Transmission
|
Freeman, Edward H. |
|
1999 |
|
4 |
p. 46-51 |
artikel |
10 |
Auditing Cryptography: Assessing System Security
|
Stanek, Steve |
|
2002 |
|
4 |
p. 50-54 |
artikel |
11 |
Automated Instruction Detection
|
Lunt, Teresa F. |
|
1993 |
|
4 |
p. 38-50 |
artikel |
12 |
Awareness Education as the Key to Ransomware Prevention
|
Luo, Xin |
|
2007 |
|
4 |
p. 195-202 |
artikel |
13 |
Bugging the Digital Network
|
Hoffman, Lance J. |
|
1993 |
|
4 |
p. 12-15 |
artikel |
14 |
Building an Automated Security Monitor
|
Molini, James E. |
|
1993 |
|
4 |
p. 51-59 |
artikel |
15 |
Building E-Enterprise Security: A Business View
|
Shih, Stephen C. |
|
2003 |
|
4 |
p. 41-49 |
artikel |
16 |
Building Enterprisewide Alliances
|
DeMaio, Harry B. |
|
1993 |
|
4 |
p. 7-11 |
artikel |
17 |
Certification of Security Practitioners
|
Tipton, Hal |
|
1993 |
|
4 |
p. 75-84 |
artikel |
18 |
Computer Hackers and Search and Seizure: United States v. Jarrett
|
Freeman, Edward H. |
|
2007 |
|
4 |
p. 239-243 |
artikel |
19 |
Conducting E-Business Anonymously
|
Poore, Ralph Spencer |
|
2001 |
|
4 |
p. 1-8 |
artikel |
20 |
Corporate Liability for Illegal Downloading of Copyrighted Music
|
Freeman, Edward H. |
|
2004 |
|
4 |
p. 6-10 |
artikel |
21 |
Creating and Implementing MS Office Security
|
Nemzow, Martin |
|
2004 |
|
4 |
p. 26-38 |
artikel |
22 |
Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security
|
Siegel, Carol A. |
|
2002 |
|
4 |
p. 33-49 |
artikel |
23 |
CyberScams
|
Poore, Ralph Spencer |
|
1999 |
|
4 |
p. 5-8 |
artikel |
24 |
Cyberterrorism: Postmodern State of Chaos
|
Matusitz, Jonathan |
|
2008 |
|
4 |
p. 179-187 |
artikel |
25 |
Defining A Value Proposition For Information Security… The Complete Picture
|
Ott, Jeffrey L. |
|
2000 |
|
4 |
p. 1-3 |
artikel |
26 |
Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks
|
Curran, Kevin |
|
2006 |
|
4 |
p. 17-38 |
artikel |
27 |
Developments in Security and Recovery Certification
|
Emerson, Cole |
|
1993 |
|
4 |
p. 24-27 |
artikel |
28 |
Dial-Up Modem Protection Schemes
|
Hancock, William M. |
|
1995 |
|
4 |
p. 42-51 |
artikel |
29 |
Digging Trenches
|
Tiller, Jim |
|
2005 |
|
4 |
p. 2-4 |
artikel |
30 |
Digital Cash: Fact or Fancy
|
Madsen, Wayne |
|
1996 |
|
4 |
p. 8-13 |
artikel |
31 |
Disaster Recovery Planning Software
|
Sobol, Michael I. |
|
1993 |
|
4 |
p. 28-32 |
artikel |
32 |
EDI Integrity Controls
|
Benesko, Gary |
|
1995 |
|
4 |
p. 21-25 |
artikel |
33 |
EDITOR'S EDITION
|
Poore, Ralph Spencer |
|
1998 |
|
4 |
p. 3-5 |
artikel |
34 |
Enclaves: The Enterprise as an Extranet
|
Koch, Bryan T. |
|
2000 |
|
4 |
p. 1-10 |
artikel |
35 |
Encryption Keys: Randomness Is Key to Their Undoing
|
Vacca, John R. |
|
2000 |
|
4 |
p. 1-6 |
artikel |
36 |
End-User Computing Security Guidelines
|
Hale, Ron |
|
1996 |
|
4 |
p. 49-64 |
artikel |
37 |
Enterprise Security Architecture
|
Murray, William Hugh |
|
1998 |
|
4 |
p. 43-54 |
artikel |
38 |
Everything Has Changed, But It Is All the Same
|
Ott, Jeffrey L. |
|
2002 |
|
4 |
p. 2-3 |
artikel |
39 |
Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1
|
Jones, Andy |
|
2002 |
|
4 |
p. 9-20 |
artikel |
40 |
Executives Need to Know: The Arguments to Include in a Benefits Justification for Increased Cyber Security Spending
|
Braithwaite, Timothy |
|
2001 |
|
4 |
p. 1-14 |
artikel |
41 |
Exporting Encryption Software and the First Amendment: Bernstein v. U.S. Department of State
|
Freeman, Edward H. |
|
2003 |
|
4 |
p. 12-16 |
artikel |
42 |
Flying by the Seat of Our Pants
|
Stephenson, Peter |
|
2000 |
|
4 |
p. 1-5 |
artikel |
43 |
Forensic Analysis of Risks in Enterprise Systems
|
Stephenson, Peter |
|
2004 |
|
4 |
p. 11-21 |
artikel |
44 |
From the Editor
|
Parker, Donn B. |
|
1993 |
|
4 |
p. 3 |
artikel |
45 |
FROM THE EDITOR
|
Parker, Donn B. |
|
1995 |
|
4 |
p. 3-4 |
artikel |
46 |
From the Editor's Desk
|
Namuduri, Kamesh |
|
2007 |
|
4 |
p. 187 |
artikel |
47 |
From the Editor's Desk
|
Namuduri, Kamesh |
|
2008 |
|
4 |
p. 163 |
artikel |
48 |
General Misconceptions about Information Security Lead to an Insecure World
|
Utin, Daniil M. |
|
2008 |
|
4 |
p. 164-169 |
artikel |
49 |
Gmail and Privacy Issues
|
Freeman, Edward H. |
|
2006 |
|
4 |
p. 2-6 |
artikel |
50 |
Heuristics in the Fight against Computer Viruses
|
Nachenberg, Carey |
|
1998 |
|
4 |
p. 29-42 |
artikel |
51 |
Hiding Tree Structured Data and Queries from Untrusted Data Stores
|
Lin, Ping |
|
2005 |
|
4 |
p. 10-26 |
artikel |
52 |
Host-Based Security Challenges and Controls: A Survey of Contemporary Research
|
Price, Sean M. |
|
2008 |
|
4 |
p. 170-178 |
artikel |
53 |
How Secure is Your Hospital's Front Door?
|
Clark, John |
|
2008 |
|
4 |
p. 201-202 |
artikel |
54 |
How to Trap the Network Intruder
|
Flynn, Jeff |
|
1998 |
|
4 |
p. 22-28 |
artikel |
55 |
Ibuttons: Building the Infrastructure for More Secure E-commerce
|
Singh, Charanjit |
|
2000 |
|
4 |
p. 1-8 |
artikel |
56 |
I'll Take an Order of Data Sensitivity with Some Integrity on the Side: Finding a Balance within Access Control Models
|
Ferson, Patricia |
|
2004 |
|
4 |
p. 22-25 |
artikel |
57 |
Implementing and Supporting Extranets
|
Maier, Phillip Q. |
|
1999 |
|
4 |
p. 52-59 |
artikel |
58 |
Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do
|
Hernacki, Brian |
|
2006 |
|
4 |
p. 39-42 |
artikel |
59 |
Information Anarchy and the Control of Cryptography
|
Dickson, Kirby G. |
|
1995 |
|
4 |
p. 52-58 |
artikel |
60 |
Information Police on the Internet
|
Madsen, Wayne |
|
1995 |
|
4 |
p. 11-15 |
artikel |
61 |
Information Protection and Business Process Reengineering
|
DeMaio, Harry B. |
|
1995 |
|
4 |
p. 5-10 |
artikel |
62 |
Information Security: Basic to Specialized Topics
|
Moeller, Robert R. |
|
1993 |
|
4 |
p. 33-37 |
artikel |
63 |
Information Security Governance Reporting
|
Garigue, Robert |
|
2003 |
|
4 |
p. 36-40 |
artikel |
64 |
Integrity versus Accuracy
|
Rossi, John R. |
|
2008 |
|
4 |
p. 203-205 |
artikel |
65 |
Introducing Windows 2000 Security: Features and Management
|
Goldman, David |
|
2000 |
|
4 |
p. 1-9 |
artikel |
66 |
Issues of Jurisdiction in Cyberspace
|
Freeman, Edward H. |
|
1999 |
|
4 |
p. 20-26 |
artikel |
67 |
Legal Protection of Databases: Feist v. Rural Telephone Service
|
Freeman, Edward H. |
|
2001 |
|
4 |
p. 1-5 |
artikel |
68 |
Letters to the Editor
|
|
|
1993 |
|
4 |
p. 4-6 |
artikel |
69 |
Managed Security Services
|
Ott, Jeffrey L. |
|
2001 |
|
4 |
p. 1-3 |
artikel |
70 |
Managing RFID Consumer Privacy and Implementation Barriers
|
Goel, Rajni |
|
2007 |
|
4 |
p. 217-223 |
artikel |
71 |
Mitigating Malicious Code
|
Dunham, Ken |
|
2007 |
|
4 |
p. 233-238 |
artikel |
72 |
Modern Cryptography
|
Murray, William Hugh |
|
1995 |
|
4 |
p. 30-33 |
artikel |
73 |
Mydoom Miseries
|
Dunham, Ken |
|
2004 |
|
4 |
p. 2-5 |
artikel |
74 |
NetWare Security Products
|
Sobol, Michael I. |
|
1996 |
|
4 |
p. 24-28 |
artikel |
75 |
NT Security Questions and Answers
|
Blanke, Mark |
|
1999 |
|
4 |
p. 13-16 |
artikel |
76 |
OSF/DCE Security—Its Worth Exploring
|
DeMaio, Harry B. |
|
1996 |
|
4 |
p. 3-7 |
artikel |
77 |
10 Password-Generation Techniques for Users
|
|
|
1998 |
|
4 |
p. 8-9 |
artikel |
78 |
Penetration Testing Through Social Engineering
|
Ceraolo, John P. |
|
1996 |
|
4 |
p. 37-48 |
artikel |
79 |
Privacy and Security in E-Healthcare Information Management
|
Wen, H. Joseph |
|
2001 |
|
4 |
p. 1-16 |
artikel |
80 |
Products Used to Secure Networked Macintosh Computers
|
Sobol, Michael I. |
|
1995 |
|
4 |
p. 27-29 |
artikel |
81 |
Putting Hacker Crime in Perspective
|
Parker, Donn B. |
|
1993 |
|
4 |
p. 16-19 |
artikel |
82 |
Quantifying and Lowering Security Costs — Hard Dollars
|
Carden, Philip |
|
1999 |
|
4 |
p. 17-19 |
artikel |
83 |
Retention of Corporate E-Documents under Sarbanes—Oxley
|
Freeman, Edward H. |
|
2005 |
|
4 |
p. 5-9 |
artikel |
84 |
Risk Analysis and Risk Management
|
Peltier, Thomas R. |
|
2004 |
|
4 |
p. 44-56 |
artikel |
85 |
Securing NetWare Against Trojan Horse Attacks
|
Sawicki, Ed |
|
1995 |
|
4 |
p. 34-41 |
artikel |
86 |
Securing RFID Applications: Issues, Methods, and Controls
|
So, Stuart C. K. |
|
2006 |
|
4 |
p. 43-50 |
artikel |
87 |
Securing the Information Workplace: Managing Threats to Enterprise E-Mail, IM, and Document Sharing Environments
|
Licari, Joe |
|
2005 |
|
4 |
p. 45-50 |
artikel |
88 |
Securing the OS/2 Operating Environment
|
Anderson, David L. |
|
1993 |
|
4 |
p. 60-73 |
artikel |
89 |
Securing Web Services
|
Jaamour, Rami |
|
2005 |
|
4 |
p. 36-44 |
artikel |
90 |
Security Accountability in Job Performance
|
Parker, Donn B. |
|
1995 |
|
4 |
p. 16-20 |
artikel |
91 |
Security as the Target of Criminals
|
Parker, Donn B. |
|
1996 |
|
4 |
p. 14-20 |
artikel |
92 |
Security Awareness Tools
|
|
|
1998 |
|
4 |
p. 6-7 |
artikel |
93 |
Security in an Oracle Data Base Environment
|
Davidson, Mary Ann |
|
1995 |
|
4 |
p. 59-68 |
artikel |
94 |
Security in Multidimensional Data Bases
|
Teplitzky, Philip |
|
1996 |
|
4 |
p. 21-23 |
artikel |
95 |
Security Testing Is Not All The Same: A Reference Taxonomy
|
Kates, Jim |
|
1998 |
|
4 |
p. 55-60 |
artikel |
96 |
Service-Oriented Security Architecture and its Implications for Security Department Organization Structures
|
Neal, Russ |
|
2008 |
|
4 |
p. 188-200 |
artikel |
97 |
Software Piracy: Some Facts, Figures, and Issues
|
Gallegos, Frederick |
|
2000 |
|
4 |
p. 1-23 |
artikel |
98 |
Switched Network Sniffers Detection Technique Based on IP Packet Routing
|
Trabelsi, Zouheir |
|
2005 |
|
4 |
p. 51-60 |
artikel |
99 |
Tech Trivia Challenge
|
|
|
2002 |
|
4 |
p. 55 |
artikel |
100 |
The Dangerous Precedent Set in the Use of Electronic Identifiers
|
Vacca, John R. |
|
2000 |
|
4 |
p. 1-8 |
artikel |
101 |
The Digital Millennium Copyright Act
|
Freeman, Edward H. |
|
2002 |
|
4 |
p. 4-8 |
artikel |
102 |
The Five Myths of Wireless Security
|
Kindervag, John |
|
2006 |
|
4 |
p. 7-16 |
artikel |
103 |
The Growing Problem of Virus Hoaxes
|
Rothke, Ben |
|
2000 |
|
4 |
p. 1-6 |
artikel |
104 |
The International Dimensions of Cyber-Crime, Part 1
|
Gabrys, Ed |
|
2002 |
|
4 |
p. 21-32 |
artikel |
105 |
The IT Compliance Equation: Understanding the Elements
|
Schlarman, Steven |
|
2007 |
|
4 |
p. 224-232 |
artikel |
106 |
The New Frontier: Client/Server and Agent Technology—Part 2
|
Molini, James E. |
|
1996 |
|
4 |
p. 29-36 |
artikel |
107 |
The New Millennium
|
Ott, Jeffrey L. |
|
2000 |
|
4 |
p. 1-3 |
artikel |
108 |
The Top Information Security Issues Facing Organizations: What Can Government Do to Help?
|
Knapp, Kenneth J. |
|
2006 |
|
4 |
p. 51-58 |
artikel |
109 |
The Trouble with Trojans
|
Dunham, Ken |
|
2003 |
|
4 |
p. 19-28 |
artikel |
110 |
The Weak Link in Distributed Data Base Security
|
Teplitzky, Philip |
|
1993 |
|
4 |
p. 20-23 |
artikel |
111 |
Top Secret Traffic and the Public ATM Network Infrastructure
|
Schumacher, H. J. |
|
1999 |
|
4 |
p. 27-45 |
artikel |
112 |
Trends in Security Product Evaluations
|
Smith, Richard E. |
|
2007 |
|
4 |
p. 203-216 |
artikel |
113 |
Turning Application Security Inside Out: Security for Service-Oriented Architectures (SOAs)
|
Carlson, Brent |
|
2005 |
|
4 |
p. 27-35 |
artikel |
114 |
Twelve Months to Go — and Counting
|
Ott, Jeffrey L. |
|
1999 |
|
4 |
p. 3-4 |
artikel |
115 |
Understanding Internet Protocol Security
|
Thomas, J. |
|
2004 |
|
4 |
p. 39-43 |
artikel |
116 |
Valuing Information Assets for Security Risk Management
|
Poore, Ralph Spencer |
|
2000 |
|
4 |
p. 1-7 |
artikel |
117 |
Where Is the IDS?
|
Stephenson, Peter |
|
2000 |
|
4 |
p. 1-6 |
artikel |
118 |
Who Guards the Computer Security Guards?
|
Rothke, Ben |
|
2003 |
|
4 |
p. 17-18 |
artikel |
119 |
You Installed Internet Security on Your Network: Is Your Company Safe?
|
Sherstobitoff, Ryan |
|
2007 |
|
4 |
p. 188-194 |
artikel |
120 |
Your Computer Forensic Toolkit
|
Kuchta, Kelly J. |
|
2001 |
|
4 |
p. 1-12 |
artikel |