nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Addressing Privacy Issues During Disaster Recovery
|
Herold, Rebecca |
|
2006 |
14 |
6 |
p. 16-22 |
artikel |
2 |
Best Practices for Building a Security Operations Center
|
Kelley, Diana |
|
2006 |
14 |
6 |
p. 27-32 |
artikel |
3 |
Disclosure of Information Theft: The ChoicePoint Security Breach
|
Freeman, Edward H. |
|
2006 |
14 |
6 |
p. 11-15 |
artikel |
4 |
Don't Trust Your Vendor's Software Distribution Methodology
|
Storms, Andrew |
|
2006 |
14 |
6 |
p. 38-43 |
artikel |
5 |
Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle
|
Kodaganallur, Viswanathan |
|
2006 |
14 |
6 |
p. 44-52 |
artikel |
6 |
Source Code Implications for Malcode
|
Dunham, Ken |
|
2006 |
14 |
6 |
p. 6-10 |
artikel |
7 |
The Inside-Out Approach to Infection Control
|
Milito, Rodolfo A. |
|
2006 |
14 |
6 |
p. 33-37 |
artikel |
8 |
Visa, Everywhere You Want to Be
|
Tiller, Jim |
|
2006 |
14 |
6 |
p. 2-5 |
artikel |
9 |
Why You Should Not Play the Numbers Game with Anti-Spyware Vendors
|
English, Ed |
|
2006 |
14 |
6 |
p. 23-26 |
artikel |