Security Views, Dr. Bill Hancock, CISSP - GTE Employee Admits Guilty in Insider Data Corruption Case (English)
In:
Computers & security
;
20
, 3
; 190
;
2001
-
ISSN:
- Article (Journal) / Print
-
Title:Security Views, Dr. Bill Hancock, CISSP - GTE Employee Admits Guilty in Insider Data Corruption Case
-
Published in:Computers & security ; 20, 3 ; 190
-
Publisher:
- New search for: Elsevier
-
Place of publication:Kidlington, Oxford
-
Publication date:2001
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents – Volume 20, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 186
-
From the Editor| 2001
- 188
-
Security Views, Dr. Bill Hancock, CISSP - Social Engineering Still Popular: Verisign Loses Microsoft Certs| 2001
- 188
-
Security Views, Dr. Bill Hancock, CISSP| 2001
- 190
-
Security Views, Dr. Bill Hancock, CISSP - Worms Are the Latest Rage with Hacking Efforts| 2001
- 190
-
Security Views, Dr. Bill Hancock, CISSP - GTE Employee Admits Guilty in Insider Data Corruption Case| 2001
- 191
-
Security Views, Dr. Bill Hancock, CISSP - Security Trade Shows are Getting Out of Hand| 2001
- 192
-
Security Views, Dr. Bill Hancock, CISSP - British Government Increases Focus on Hacking Concerns| 2001
- 193
-
Security Views, Dr. Bill Hancock, CISSP - The US Government and Religion Square Off on Airwave Allocation| 2001
- 195
-
Security Views, Dr. Bill Hancock, CISSP - Partnership Creates Healthcare Security Concerns| 2001
- 196
-
Security Views, Dr. Bill Hancock, CISSP - Outlook 2002: Kill Attachments to Increase Security| 2001
- 198
-
Security Views, Dr. Bill Hancock, CISSP - US Government Sources Disclose 155 Hacking Successes| 2001
- 199
-
Security Views, Dr. Bill Hancock, CISSP - Wireless Vulnerabilities Continue to Mount| 2001
- 200
-
Security Views, Dr. Bill Hancock, CISSP - Polymorphic Code Threatens Sites| 2001
- 202
-
Special Features - The Times They Are A-Changin'Hinde, Stephen et al. | 2001
- 202
-
The Times They Are A-Changin`Hinde, S. et al. | 2001
- 207
-
Protecting 21st Century Information - It`s Time for a ChangeKovacich, G. L. et al. | 2001
- 207
-
Special Features - Protecting 21st Century Information - It's Time For a ChangeKovacich, Gerald et al. | 2001
- 215
-
Special Features - Corporate Governance and Information SecuritySolms, Basie Von et al. | 2001
- 215
-
Corporate Governance and Information Securityvon Solms, B. et al. | 2001
- 219
-
Security Training: Education For an Emerging Profession?Horrocks, I. et al. | 2001
- 219
-
Special Features - Security Training: Education For an Emerging Profession?Horrocks, Ivan et al. | 2001
- 227
-
Special Features - Securing Your Brand in CyberspaceCarter, Bob et al. | 2001
- 227
-
Securing Your Brand In CyberspaceCarter, B. et al. | 2001
- 239
-
Current Literature - Abstracts of recent articles and literature| 2001
- 244
-
Events - Calendar of forthcoming conferences and events| 2001
- 246
-
Index Volume 19 - Author Index| 2001
- 247
-
Index Volume 19 - Subject Index| 2001
- 253
-
Refereed Papers - International Board of Referees| 2001
- 255
-
Refereed Papers - Methods for Timestamping Electronic Documents Using Certificates and User-Specified TimesPeyravian, Mohammad et al. | 2001
- 255
-
Methods for Timestamping Electronic Documents Using Certificates and User-Specified TimesPeyravian, M. / Matyas, S. M. / Roginsky, A. / Zunic, N. et al. | 2001
- 263
-
Refereed Papers - A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall InternalsFrantzen, Mike et al. | 2001
- 263
-
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall InternalsFrantzen, M. / Kerschbaum, F. / Schultz, E. E. / Fahmy, S. et al. | 2001
- 271
-
IFIP Technical Committee 11| 2001
- 274
-
Guide To Authors| 2001