Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             209 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A computer security nightmare Highland, Harold J.
1991
2 p. 6-7
2 p.
artikel
2 A fishy story 1980
2 p. 6-7
2 p.
artikel
3 A guide to intellectual property protection in the US 1986
2 p. 1-7
7 p.
artikel
4 Airline fraud 1978
2 p. 18-
1 p.
artikel
5 An honest mistake 1979
2 p. 1-2
2 p.
artikel
6 An introduction Sommer, Peter
1993
2 p. 10-15
6 p.
artikel
7 An ODE for computer security Monro, Duncan
1990
2 p. 15-19
5 p.
artikel
8 A practical approach to logical access control Sommer, Peter
1994
2 p. 19-
1 p.
artikel
9 A recovery case study Hall, DavidJ.
1990
2 p. 10-13
4 p.
artikel
10 A report on the Panama diskette Gliss, Hans
1990
2 p. 6-10
5 p.
artikel
11 Arrest for Internet crimes 1995
2 p. 2-
1 p.
artikel
12 Arson suspected 1978
2 p. 13-
1 p.
artikel
13 ATM security relies on ‘consumer education’ 1990
2 p. 4-
1 p.
artikel
14 AT&T interruptions continue Menkus, Belden
1992
2 p. 1-3
3 p.
artikel
15 Auditors call for new legislation 1990
2 p. 3-4
2 p.
artikel
16 Australian company develops Computer Safeguard 1987
2 p. 10-11
2 p.
artikel
17 Australian government amends software sales tax law Rees, Frank
1988
2 p. 4-
1 p.
artikel
18 Australian virus group is founded 1991
2 p. 3-
1 p.
artikel
19 Automated support of risk management 1982
2 p. 5-11
7 p.
artikel
20 Automotive parts maker pays for pirated software 1995
2 p. 4-
1 p.
artikel
21 39 bank accounts 1978
2 p. 13-
1 p.
artikel
22 Bank workers held after computer sabotage 1991
2 p. 5-
1 p.
artikel
23 BBN communications halves cost of network access security system 1988
2 p. 3-4
2 p.
artikel
24 Big brother watches Australia 1991
2 p. 3-4
2 p.
artikel
25 Biometrics seminar 1988
2 p. 20-
1 p.
artikel
26 Blank payment warrants 1978
2 p. 12-
1 p.
artikel
27 British skill shortage 1989
2 p. 2-3
2 p.
artikel
28 BSA announces piracy prosecutions in Europe 1991
2 p. 4-5
2 p.
artikel
29 BSA cracks down on small companies suspected of software piracy Riggs, Brian
1994
2 p. 9-10
2 p.
artikel
30 BSA hunts Singapore pirates 1990
2 p. 2-3
2 p.
artikel
31 Calculating the cost of delay (Cont'd) Jacobson, Bob
1981
2 p. 3-5
3 p.
artikel
32 Californian crack-down 1989
2 p. 2-
1 p.
artikel
33 Case studies: Vulnerability of dial-up access to computers 1979
2 p. 10-16
7 p.
artikel
34 CD-ROM not safe from piracy 1994
2 p. 4-
1 p.
artikel
35 CFSB interview no 1 1981
2 p. 5-6
2 p.
artikel
36 Charges dropped against student 1995
2 p. 2-3
2 p.
artikel
37 Cheating the computer 1979
2 p. 4-5
2 p.
artikel
38 Cleaning up trade shows Riggs, Brian
1995
2 p. 3-
1 p.
artikel
39 Client/server, a security risk? 1994
2 p. 1-2
2 p.
artikel
40 Compsec '89 Monk, Tina
1989
2 p. 5-7
3 p.
artikel
41 Compsec report 1987
2 p. 1-3
3 p.
artikel
42 Computer component theft 1983
2 p. 6-
1 p.
artikel
43 Computer crime insurance — the tangled web 1981
2 p. 1-2
2 p.
artikel
44 Computer evidence 1984
2 p. 1-6
6 p.
artikel
45 Computer misuse act strengthened 1994
2 p. 5-
1 p.
artikel
46 Computer people 1978
2 p. 10-
1 p.
artikel
47 Computers get out of control 1980
2 p. 8-9
2 p.
artikel
48 Computer users year book: Review 1979
2 p. 6-
1 p.
artikel
49 Consortium on software protection 1983
2 p. 1-3
3 p.
artikel
50 Contingency planning 1980
2 p. 10-11
2 p.
artikel
51 Controlling systems programmers Ross, StevenJ.
1989
2 p. 7-10
4 p.
artikel
52 CORPORATE COMPUTER SECURITY ’90 1990
2 p. 19-20
2 p.
artikel
53 Cost plus contract fraud 1979
2 p. 5-6
2 p.
artikel
54 Counting the cost at Security Pacific Bank Jacobson, R.V.
1979
2 p. 2-3
2 p.
artikel
55 Credit firms test data protection act 1990
2 p. 4-
1 p.
artikel
56 Cyberpunk: Outlaws and hackers on the computer frontier Davidson, Clive
1992
2 p. 20-
1 p.
artikel
57 Data and information security in Norwegial banking Kvam, Lars
1988
2 p. 4-6
3 p.
artikel
58 Databases that talk too much Snell, Monica
1994
2 p. 9-
1 p.
artikel
59 Datakeep M.D. explains philosophy 1978
2 p. 5-7
3 p.
artikel
60 Data matching not justified in most cases Madsen, Wayne
1994
2 p. 8-9
2 p.
artikel
61 Data privacy row hits Hongkong 1993
2 p. 3-
1 p.
artikel
62 Directories 1978
2 p. 17-18
2 p.
artikel
63 Direct sequence spread spectrum access to local area networks Spracklen, Tim
1986
2 p. 7-15
9 p.
artikel
64 Disaster recovery site loses power Menkus, Belden
1992
2 p. 3-4
2 p.
artikel
65 Dutch Government fails privacy audit Gannon, Paul
1993
2 p. 3-
1 p.
artikel
66 Dutch hacker video now out 1992
2 p. 3-
1 p.
artikel
67 Editorial 1978
2 p. 1-
1 p.
artikel
68 Editorial Board 1991
2 p. 1-
1 p.
artikel
69 Electronic picketing Lack, Kelvin
1989
2 p. 10-12
3 p.
artikel
70 Encryption export legislation proposed Madsen, Wayne
1994
2 p. 6-7
2 p.
artikel
71 Encryption slow to catch on 1981
2 p. 6-7
2 p.
artikel
72 Events 1995
2 p. 20-
1 p.
artikel
73 Events 1993
2 p. 18-19
2 p.
artikel
74 Events 1994
2 p. 20-
1 p.
artikel
75 Events 1991
2 p. 17-18
2 p.
artikel
76 Events 1992
2 p. 19-
1 p.
artikel
77 Events 1989
2 p. 19-20
2 p.
artikel
78 15 face fraud charges 1994
2 p. 3-
1 p.
artikel
79 Failed card fraudsters sentenced 1994
2 p. 2-
1 p.
artikel
80 FANB employee arrested 1978
2 p. 12-13
2 p.
artikel
81 FAST bogged down by software piracy 1995
2 p. 3-4
2 p.
artikel
82 Fast response to EC 1989
2 p. 1-2
2 p.
artikel
83 Fighting mobile phone fraud — Part 2 Wong, Ken
1995
2 p. 10-14
5 p.
artikel
84 Fraud prevention and computer security for financial institutions — Part 1 Essinger, James
1995
2 p. 17-19
3 p.
artikel
85 Fraudulent electronics order 1978
2 p. 13-
1 p.
artikel
86 Frozen data 1985
2 p. 15-16
2 p.
artikel
87 Further controversy over electronic surveillance 1994
2 p. 3-4
2 p.
artikel
88 Further losses from voicemail fraud 1995
2 p. 1-2
2 p.
artikel
89 Gangsters catch up with the computer era 1979
2 p. 3-4
2 p.
artikel
90 Government stance on Internet porn 1995
2 p. 4-5
2 p.
artikel
91 Hacking debate at Westminster 1990
2 p. 5-6
2 p.
artikel
92 Hacking for profit 1985
2 p. 15-
1 p.
artikel
93 Hands on computer fraud seminar 1981
2 p. 2-3
2 p.
artikel
94 How much should companies reveal? 1978
2 p. 4-5
2 p.
artikel
95 IBM moves to protect itself 1980
2 p. 7-
1 p.
artikel
96 Identification technologies: Book review 1979
2 p. 6-7
2 p.
artikel
97 Illinois Bell does it again — twice Menkus, Belden
1991
2 p. 3-
1 p.
artikel
98 Index 1982
2 p. 1-
1 p.
artikel
99 Infiltrating the system - part II counter measures Jacobson, Bob
1980
2 p. 12-15
4 p.
artikel
100 Information security and intelligence Madsen, Wayne
1992
2 p. 6-10
5 p.
artikel
101 Information security guide 1989
2 p. 19-
1 p.
artikel
102 In next month's issue… 1988
2 p. 20-
1 p.
artikel
103 International initiatives in legislation 1989
2 p. 15-19
5 p.
artikel
104 Internet ethics Dwan, Berni
1995
2 p. 14-17
4 p.
artikel
105 Investigating inside the corporation Tipton, Hal
1993
2 p. 4-10
7 p.
artikel
106 IS managers beware! OLE may open the door to hackers Riggs, Brian
1994
2 p. 7-8
2 p.
artikel
107 Is the ‘Orange Book’ flawed? 1990
2 p. 3-
1 p.
artikel
108 Law commission's report debated 1989
2 p. 3-4
2 p.
artikel
109 Laws and computer crime: Letter to the ed. 1983
2 p. 6-7
2 p.
artikel
110 Lessons from a Swedish study of computer crimes Solarz, Artur
1988
2 p. 6-12
7 p.
artikel
111 Lightning destroys Israeli database 1992
2 p. 5-
1 p.
artikel
112 Logica develops new speaker verification technique for security applications Essinger, James
1988
2 p. 16-18
3 p.
artikel
113 Mad Hacker tries to clear his name 1995
2 p. 2-
1 p.
artikel
114 Marine fraud 1978
2 p. 18-
1 p.
artikel
115 Marketplace 1995
2 p. 5-6
2 p.
artikel
116 Marketplace 1994
2 p. 5-6
2 p.
artikel
117 Marketplace 1991
2 p. 5-6
2 p.
artikel
118 Marketplace 1992
2 p. 5-6
2 p.
artikel
119 Marketplace 1990
2 p. 6-
1 p.
artikel
120 Marketplace 1989
2 p. 4-5
2 p.
artikel
121 $9 million computer blackmail plot 1990
2 p. 1-2
2 p.
artikel
122 Miscellaneous frauds 1982
2 p. 1-3
3 p.
artikel
123 6 months before fraud discovered 1978
2 p. 14-
1 p.
artikel
124 More computers, more crime 1994
2 p. 2-
1 p.
artikel
125 More e-mail legal actions Menkus, Belden
1992
2 p. 4-5
2 p.
artikel
126 More on securicom '83 1982
2 p. 11-12
2 p.
artikel
127 Mozart sheds new light on banknote fraud 1990
2 p. 3-
1 p.
artikel
128 NASA finds anti-nuclear worm 1989
2 p. 2-
1 p.
artikel
129 NCR symposium tackles open systems security issue 1988
2 p. 13-15
3 p.
artikel
130 Network Security Supplement 1987
2 p. 1-
1 p.
artikel
131 New government standard launch 1995
2 p. 5-
1 p.
artikel
132 New products 1991
2 p. 18-19
2 p.
artikel
133 New products 1992
2 p. 18-
1 p.
artikel
134 New version of Norton utilities launched 1988
2 p. 1-3
3 p.
artikel
135 New York hackers wreck voice mail system 1991
2 p. 1-2
2 p.
artikel
136 Nine steps to effective EDP loss control 1983
2 p. 7-11
5 p.
artikel
137 NRC urges formation of private US foundation 1991
2 p. 2-
1 p.
artikel
138 Nurse alters hospital prescriptions 1994
2 p. 4-5
2 p.
artikel
139 On-line strikes: Planning for industrial action 1979
2 p. 7-10
4 p.
artikel
140 On the heels of the ex-employee English, Erin
1995
2 p. 6-7
2 p.
artikel
141 Paris Bourse goes down Gannon, Paul
1993
2 p. 2-
1 p.
artikel
142 Password breaking 1981
2 p. 7-8
2 p.
artikel
143 PC access products: How good are they? Rodgers, Allan
1994
2 p. 10-13
4 p.
artikel
144 Pick of the bulletin board 1985
2 p. 1-15
15 p.
artikel
145 Planning ahead Mansel, Ian
1989
2 p. 12-15
4 p.
artikel
146 Playing to win 1980
2 p. 15-16
2 p.
artikel
147 Police on the ‘superhighway’ 1995
2 p. 4-
1 p.
artikel
148 Prevention 1978
2 p. 15-
1 p.
artikel
149 Prevention and detection of computer fraud 1978
2 p. 2-3
2 p.
artikel
150 Prison sentences for ATM fraudsters 1994
2 p. 2-
1 p.
artikel
151 Program and data thefts 1980
2 p. 2-4
3 p.
artikel
152 Protecting information on local area network Jackson, Keith
1988
2 p. 18-19
2 p.
artikel
153 Quantum cryptography 1993
2 p. 4-
1 p.
artikel
154 Roles changed in downsized environment 1993
2 p. 3-
1 p.
artikel
155 Satellite-secrecy contract 1994
2 p. 3-
1 p.
artikel
156 Screwdriver in the works 1980
2 p. 4-6
3 p.
artikel
157 Second world conference on transborder data flow policies - Rome - 26–29 June 1984 1983
2 p. 12-
1 p.
artikel
158 Security moves to the forefront 1992
2 p. 5-
1 p.
artikel
159 Security pacific defrauded 1978
2 p. 11-12
2 p.
artikel
160 ‘Security’ vs. profit? 1983
2 p. 3-6
4 p.
artikel
161 Selling IS to the employees Peltier, ThomasR.
1992
2 p. 10-17
8 p.
artikel
162 Small firms attacked by pirates 1980
2 p. 1-2
2 p.
artikel
163 So-called first UK computer crime 1982
2 p. 3-5
3 p.
artikel
164 Software licensing Brown, Steve
1994
2 p. 17-18
2 p.
artikel
165 Some are more secure than others 1980
2 p. 15-
1 p.
artikel
166 Some new directions Shain, Mike
1991
2 p. 7-17
11 p.
artikel
167 Sophos launches DESTEST and RSATEST 1988
2 p. 3-
1 p.
artikel
168 SPA reveals increase in cybercrime 1995
2 p. 3-
1 p.
artikel
169 State legislature computer spying revealed Menkus, Belden
1991
2 p. 4-
1 p.
artikel
170 Stop press Armstrong, Lisa
1995
2 p. 20-
1 p.
artikel
171 Stop press 1994
2 p. 20-
1 p.
artikel
172 Stop press 1990
2 p. 20-
1 p.
artikel
173 Stop press 1989
2 p. 20-
1 p.
artikel
174 Structured analysis 1980
2 p. 11-12
2 p.
artikel
175 Survey report 1978
2 p. 15-16
2 p.
artikel
176 Systems and data security 1978
2 p. 16-17
2 p.
artikel
177 Systems reliability and integrity 1978
2 p. 8-9
2 p.
artikel
178 Technical evaluation of SecretDisk Jackson, Keith
1987
2 p. 7-10
4 p.
artikel
179 The computer misuse act Corbitt, Terry
1994
2 p. 13-17
5 p.
artikel
180 The computer users forum 1990
2 p. 19-
1 p.
artikel
181 The implications of the SPANet hack Jackson, Keith
1987
2 p. 3-7
5 p.
artikel
182 The Italian hacker scene Ongetta, Silvano
1995
2 p. 7-
1 p.
artikel
183 The OZ Card is dead! - Long live the OZ Card! 1987
2 p. 13-14
2 p.
artikel
184 The PC security guide 1988/89 1988
2 p. 19-20
2 p.
artikel
185 The personnel side of computer security Sommer, Peter
1990
2 p. 13-15
3 p.
artikel
186 The SBA method for testing vulnerability to computer fraud 1984
2 p. 6-12
7 p.
artikel
187 Three little banking frauds 1981
2 p. 11-12
2 p.
artikel
188 Time share scam 1989
2 p. 2-
1 p.
artikel
189 Trade secrets for sale 1980
2 p. 10-
1 p.
artikel
190 UK foreign office fraud 1978
2 p. 18-
1 p.
artikel
191 UK government ministry fails audit 1992
2 p. 4-
1 p.
artikel
192 UK judge dismisses disk case 1991
2 p. 2-
1 p.
artikel
193 Underground advice 1981
2 p. 8-11
4 p.
artikel
194 Unsolicited goods 1978
2 p. 9-
1 p.
artikel
195 US computer security industry to double over next five years 1986
2 p. 15-16
2 p.
artikel
196 US firms risking computer disaster, say accountants 1987
2 p. 15-16
2 p.
artikel
197 US government board to create ‘new security order’ Madsen, Wayne
1995
2 p. 8-9
2 p.
artikel
198 US pays dear for data loss 1993
2 p. 2-
1 p.
artikel
199 US toughens piracy laws Klopp, Charlotte
1993
2 p. 1-2
2 p.
artikel
200 Value added tax fraud 1978
2 p. 14-
1 p.
artikel
201 Viewpoint Hinde, Stephen
1993
2 p. 19-20
2 p.
artikel
202 Viewpoint Gliss, Hans
1991
2 p. 20-
1 p.
artikel
203 Virus bibliography compiled 1989
2 p. 3-
1 p.
artikel
204 Viruses infect Melbourne's Chisholm Institute Rees, Frank
1990
2 p. 4-5
2 p.
artikel
205 Washington case highlights call for new US computer 1987
2 p. 11-12
2 p.
artikel
206 What to look for Solomon, Alan
1993
2 p. 15-18
4 p.
artikel
207 When is a ‘delete’ not an ‘erase’? Wong, Ken
1988
2 p. 15-16
2 p.
artikel
208 Why are building societies so prone to fraud? 1978
2 p. 3-4
2 p.
artikel
209 Why victims will not talk 1978
2 p. 7-8
2 p.
artikel
                             209 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland