Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             120 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Comparison of RealSecure and NetRanger Sample, Char
1999
4 p. 9-12
artikel
2 Advances in Cryptography Poore, Ralph Spencer
2003
4 p. 6-11
artikel
3 A Guide to NetWare 5 Security and Control Dykman, Charlene A.
2000
4 p. 1-16
artikel
4 “A Little Neglect May Breed Mischief …” O'Hanley, Rich
2003
4 p. 2-5
artikel
5 A New Approach to Security: Learning from Immunology Hofmeyr, Steven
2003
4 p. 29-35
artikel
6 An Integrated Approach to Security on Demand in ATM Networks Schumacher, H. J.
1998
4 p. 10-21
artikel
7 Anonymity on the Internet: ACLU of Georgia v. Miller Freeman, Edward H.
2000
4 p. 1-6
artikel
8 A Structured Approach to Incident Postmortems Stephenson, Peter
2003
4 p. 50-56
artikel
9 Attorney—Client Privilege and Electronic Data Transmission Freeman, Edward H.
1999
4 p. 46-51
artikel
10 Auditing Cryptography: Assessing System Security Stanek, Steve
2002
4 p. 50-54
artikel
11 Automated Instruction Detection Lunt, Teresa F.
1993
4 p. 38-50
artikel
12 Awareness Education as the Key to Ransomware Prevention Luo, Xin
2007
4 p. 195-202
artikel
13 Bugging the Digital Network Hoffman, Lance J.
1993
4 p. 12-15
artikel
14 Building an Automated Security Monitor Molini, James E.
1993
4 p. 51-59
artikel
15 Building E-Enterprise Security: A Business View Shih, Stephen C.
2003
4 p. 41-49
artikel
16 Building Enterprisewide Alliances DeMaio, Harry B.
1993
4 p. 7-11
artikel
17 Certification of Security Practitioners Tipton, Hal
1993
4 p. 75-84
artikel
18 Computer Hackers and Search and Seizure: United States v. Jarrett Freeman, Edward H.
2007
4 p. 239-243
artikel
19 Conducting E-Business Anonymously Poore, Ralph Spencer
2001
4 p. 1-8
artikel
20 Corporate Liability for Illegal Downloading of Copyrighted Music Freeman, Edward H.
2004
4 p. 6-10
artikel
21 Creating and Implementing MS Office Security Nemzow, Martin
2004
4 p. 26-38
artikel
22 Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security Siegel, Carol A.
2002
4 p. 33-49
artikel
23 CyberScams Poore, Ralph Spencer
1999
4 p. 5-8
artikel
24 Cyberterrorism: Postmodern State of Chaos Matusitz, Jonathan
2008
4 p. 179-187
artikel
25 Defining A Value Proposition For Information Security… The Complete Picture Ott, Jeffrey L.
2000
4 p. 1-3
artikel
26 Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks Curran, Kevin
2006
4 p. 17-38
artikel
27 Developments in Security and Recovery Certification Emerson, Cole
1993
4 p. 24-27
artikel
28 Dial-Up Modem Protection Schemes Hancock, William M.
1995
4 p. 42-51
artikel
29 Digging Trenches Tiller, Jim
2005
4 p. 2-4
artikel
30 Digital Cash: Fact or Fancy Madsen, Wayne
1996
4 p. 8-13
artikel
31 Disaster Recovery Planning Software Sobol, Michael I.
1993
4 p. 28-32
artikel
32 EDI Integrity Controls Benesko, Gary
1995
4 p. 21-25
artikel
33 EDITOR'S EDITION Poore, Ralph Spencer
1998
4 p. 3-5
artikel
34 Enclaves: The Enterprise as an Extranet Koch, Bryan T.
2000
4 p. 1-10
artikel
35 Encryption Keys: Randomness Is Key to Their Undoing Vacca, John R.
2000
4 p. 1-6
artikel
36 End-User Computing Security Guidelines Hale, Ron
1996
4 p. 49-64
artikel
37 Enterprise Security Architecture Murray, William Hugh
1998
4 p. 43-54
artikel
38 Everything Has Changed, But It Is All the Same Ott, Jeffrey L.
2002
4 p. 2-3
artikel
39 Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1 Jones, Andy
2002
4 p. 9-20
artikel
40 Executives Need to Know: The Arguments to Include in a Benefits Justification for Increased Cyber Security Spending Braithwaite, Timothy
2001
4 p. 1-14
artikel
41 Exporting Encryption Software and the First Amendment: Bernstein v. U.S. Department of State Freeman, Edward H.
2003
4 p. 12-16
artikel
42 Flying by the Seat of Our Pants Stephenson, Peter
2000
4 p. 1-5
artikel
43 Forensic Analysis of Risks in Enterprise Systems Stephenson, Peter
2004
4 p. 11-21
artikel
44 From the Editor Parker, Donn B.
1993
4 p. 3
artikel
45 FROM THE EDITOR Parker, Donn B.
1995
4 p. 3-4
artikel
46 From the Editor's Desk Namuduri, Kamesh
2007
4 p. 187
artikel
47 From the Editor's Desk Namuduri, Kamesh
2008
4 p. 163
artikel
48 General Misconceptions about Information Security Lead to an Insecure World Utin, Daniil M.
2008
4 p. 164-169
artikel
49 Gmail and Privacy Issues Freeman, Edward H.
2006
4 p. 2-6
artikel
50 Heuristics in the Fight against Computer Viruses Nachenberg, Carey
1998
4 p. 29-42
artikel
51 Hiding Tree Structured Data and Queries from Untrusted Data Stores Lin, Ping
2005
4 p. 10-26
artikel
52 Host-Based Security Challenges and Controls: A Survey of Contemporary Research Price, Sean M.
2008
4 p. 170-178
artikel
53 How Secure is Your Hospital's Front Door? Clark, John
2008
4 p. 201-202
artikel
54 How to Trap the Network Intruder Flynn, Jeff
1998
4 p. 22-28
artikel
55 Ibuttons: Building the Infrastructure for More Secure E-commerce Singh, Charanjit
2000
4 p. 1-8
artikel
56 I'll Take an Order of Data Sensitivity with Some Integrity on the Side: Finding a Balance within Access Control Models Ferson, Patricia
2004
4 p. 22-25
artikel
57 Implementing and Supporting Extranets Maier, Phillip Q.
1999
4 p. 52-59
artikel
58 Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do Hernacki, Brian
2006
4 p. 39-42
artikel
59 Information Anarchy and the Control of Cryptography Dickson, Kirby G.
1995
4 p. 52-58
artikel
60 Information Police on the Internet Madsen, Wayne
1995
4 p. 11-15
artikel
61 Information Protection and Business Process Reengineering DeMaio, Harry B.
1995
4 p. 5-10
artikel
62 Information Security: Basic to Specialized Topics Moeller, Robert R.
1993
4 p. 33-37
artikel
63 Information Security Governance Reporting Garigue, Robert
2003
4 p. 36-40
artikel
64 Integrity versus Accuracy Rossi, John R.
2008
4 p. 203-205
artikel
65 Introducing Windows 2000 Security: Features and Management Goldman, David
2000
4 p. 1-9
artikel
66 Issues of Jurisdiction in Cyberspace Freeman, Edward H.
1999
4 p. 20-26
artikel
67 Legal Protection of Databases: Feist v. Rural Telephone Service Freeman, Edward H.
2001
4 p. 1-5
artikel
68 Letters to the Editor 1993
4 p. 4-6
artikel
69 Managed Security Services Ott, Jeffrey L.
2001
4 p. 1-3
artikel
70 Managing RFID Consumer Privacy and Implementation Barriers Goel, Rajni
2007
4 p. 217-223
artikel
71 Mitigating Malicious Code Dunham, Ken
2007
4 p. 233-238
artikel
72 Modern Cryptography Murray, William Hugh
1995
4 p. 30-33
artikel
73 Mydoom Miseries Dunham, Ken
2004
4 p. 2-5
artikel
74 NetWare Security Products Sobol, Michael I.
1996
4 p. 24-28
artikel
75 NT Security Questions and Answers Blanke, Mark
1999
4 p. 13-16
artikel
76 OSF/DCE Security—Its Worth Exploring DeMaio, Harry B.
1996
4 p. 3-7
artikel
77 10 Password-Generation Techniques for Users 1998
4 p. 8-9
artikel
78 Penetration Testing Through Social Engineering Ceraolo, John P.
1996
4 p. 37-48
artikel
79 Privacy and Security in E-Healthcare Information Management Wen, H. Joseph
2001
4 p. 1-16
artikel
80 Products Used to Secure Networked Macintosh Computers Sobol, Michael I.
1995
4 p. 27-29
artikel
81 Putting Hacker Crime in Perspective Parker, Donn B.
1993
4 p. 16-19
artikel
82 Quantifying and Lowering Security Costs — Hard Dollars Carden, Philip
1999
4 p. 17-19
artikel
83 Retention of Corporate E-Documents under Sarbanes—Oxley Freeman, Edward H.
2005
4 p. 5-9
artikel
84 Risk Analysis and Risk Management Peltier, Thomas R.
2004
4 p. 44-56
artikel
85 Securing NetWare Against Trojan Horse Attacks Sawicki, Ed
1995
4 p. 34-41
artikel
86 Securing RFID Applications: Issues, Methods, and Controls So, Stuart C. K.
2006
4 p. 43-50
artikel
87 Securing the Information Workplace: Managing Threats to Enterprise E-Mail, IM, and Document Sharing Environments Licari, Joe
2005
4 p. 45-50
artikel
88 Securing the OS/2 Operating Environment Anderson, David L.
1993
4 p. 60-73
artikel
89 Securing Web Services Jaamour, Rami
2005
4 p. 36-44
artikel
90 Security Accountability in Job Performance Parker, Donn B.
1995
4 p. 16-20
artikel
91 Security as the Target of Criminals Parker, Donn B.
1996
4 p. 14-20
artikel
92 Security Awareness Tools 1998
4 p. 6-7
artikel
93 Security in an Oracle Data Base Environment Davidson, Mary Ann
1995
4 p. 59-68
artikel
94 Security in Multidimensional Data Bases Teplitzky, Philip
1996
4 p. 21-23
artikel
95 Security Testing Is Not All The Same: A Reference Taxonomy Kates, Jim
1998
4 p. 55-60
artikel
96 Service-Oriented Security Architecture and its Implications for Security Department Organization Structures Neal, Russ
2008
4 p. 188-200
artikel
97 Software Piracy: Some Facts, Figures, and Issues Gallegos, Frederick
2000
4 p. 1-23
artikel
98 Switched Network Sniffers Detection Technique Based on IP Packet Routing Trabelsi, Zouheir
2005
4 p. 51-60
artikel
99 Tech Trivia Challenge 2002
4 p. 55
artikel
100 The Dangerous Precedent Set in the Use of Electronic Identifiers Vacca, John R.
2000
4 p. 1-8
artikel
101 The Digital Millennium Copyright Act Freeman, Edward H.
2002
4 p. 4-8
artikel
102 The Five Myths of Wireless Security Kindervag, John
2006
4 p. 7-16
artikel
103 The Growing Problem of Virus Hoaxes Rothke, Ben
2000
4 p. 1-6
artikel
104 The International Dimensions of Cyber-Crime, Part 1 Gabrys, Ed
2002
4 p. 21-32
artikel
105 The IT Compliance Equation: Understanding the Elements Schlarman, Steven
2007
4 p. 224-232
artikel
106 The New Frontier: Client/Server and Agent Technology—Part 2 Molini, James E.
1996
4 p. 29-36
artikel
107 The New Millennium Ott, Jeffrey L.
2000
4 p. 1-3
artikel
108 The Top Information Security Issues Facing Organizations: What Can Government Do to Help? Knapp, Kenneth J.
2006
4 p. 51-58
artikel
109 The Trouble with Trojans Dunham, Ken
2003
4 p. 19-28
artikel
110 The Weak Link in Distributed Data Base Security Teplitzky, Philip
1993
4 p. 20-23
artikel
111 Top Secret Traffic and the Public ATM Network Infrastructure Schumacher, H. J.
1999
4 p. 27-45
artikel
112 Trends in Security Product Evaluations Smith, Richard E.
2007
4 p. 203-216
artikel
113 Turning Application Security Inside Out: Security for Service-Oriented Architectures (SOAs) Carlson, Brent
2005
4 p. 27-35
artikel
114 Twelve Months to Go — and Counting Ott, Jeffrey L.
1999
4 p. 3-4
artikel
115 Understanding Internet Protocol Security Thomas, J.
2004
4 p. 39-43
artikel
116 Valuing Information Assets for Security Risk Management Poore, Ralph Spencer
2000
4 p. 1-7
artikel
117 Where Is the IDS? Stephenson, Peter
2000
4 p. 1-6
artikel
118 Who Guards the Computer Security Guards? Rothke, Ben
2003
4 p. 17-18
artikel
119 You Installed Internet Security on Your Network: Is Your Company Safe? Sherstobitoff, Ryan
2007
4 p. 188-194
artikel
120 Your Computer Forensic Toolkit Kuchta, Kelly J.
2001
4 p. 1-12
artikel
                             120 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland