Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             175 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Administrative controls for password-based computer access control systems Wood, CharlesCresson
1986
3 p. 5-13
9 p.
artikel
2 Advanced EDP seminar 1984
3 p. 11-12
2 p.
artikel
3 Amdahl ships defective disk drives Menkus, Belden
1992
3 p. 3-4
2 p.
artikel
4 Anti-virus products—some questions answered Hruska, Jan
1989
3 p. 7-9
3 p.
artikel
5 A pat on the back for the met 1980
3 p. 7-8
2 p.
artikel
6 A risk-ranking technique 1982
3 p. 9-14
6 p.
artikel
7 AT&T and VLSI offer data security 1995
3 p. 4-
1 p.
artikel
8 Auditing through the computer: A critique Moffett, JD
1980
3 p. 8-15
8 p.
artikel
9 BA's computerized dirty tricks campaign 1993
3 p. 4-
1 p.
artikel
10 Bomber stalks internet Zajac, Bernard P.
1994
3 p. 7-8
2 p.
artikel
11 BR complains about counterfeit NetWare 1995
3 p. 4-
1 p.
artikel
12 Campaigning for real software 1990
3 p. 3-4
2 p.
artikel
13 Canadians convict first computer pirate 1991
3 p. 4-
1 p.
artikel
14 Car rental chain former owners charged with computer frauds Menkus, Belden
1993
3 p. 3-4
2 p.
artikel
15 Challenge to US computer fraud & abuse act 1991
3 p. 5-6
2 p.
artikel
16 Chip, Gooseberry and Dirty Dan teach kids how to use a computer Moeller, Mike
1993
3 p. 3-
1 p.
artikel
17 Clipper chip compromise proposed Riggs, Brian
1994
3 p. 4-
1 p.
artikel
18 Commonsense computer security Smith, M.R.
1991
3 p. 7-15
9 p.
artikel
19 COMPSEC '86 1986
3 p. 15-
1 p.
artikel
20 Compsec '87 1987
3 p. 12-
1 p.
artikel
21 Computer audit and systems development 1988
3 p. 5-7
3 p.
artikel
22 Computer, business and security 1988
3 p. 13-14
2 p.
artikel
23 Computer crime - kids' stuff? 1981
3 p. 9-11
3 p.
artikel
24 Computer error cripples school income Menkus, Belden
1992
3 p. 5-
1 p.
artikel
25 Computer fraud penalty laws in Norway 1986
3 p. 14-
1 p.
artikel
26 Computer fraud survey 1981
3 p. 3-4
2 p.
artikel
27 Computer media — cleaning up the weak link Malcolm, Alan
1991
3 p. 15-17
3 p.
artikel
28 Computer people 1979
3 p. 8-9
2 p.
artikel
29 Computer risk manager 1990
3 p. 16-
1 p.
artikel
30 Computers and the law 1981
3 p. 6-9
4 p.
artikel
31 Computer Security Institute 1979
3 p. 12-
1 p.
artikel
32 Computer security products 1990
3 p. 16-
1 p.
artikel
33 Computers & security journal 1990
3 p. 15-16
2 p.
artikel
34 Confusing the issue? 1983
3 p. 11-
1 p.
artikel
35 Contingency planning 1982
3 p. 14-15
2 p.
artikel
36 Contingency planning and security: The auditor's challenge 1983
3 p. 1-9
9 p.
artikel
37 Convincing senior managers of the need for security 1980
3 p. 1-6
6 p.
artikel
38 Copyright amendment 1985
3 p. 16-
1 p.
artikel
39 Court case round-ups 1991
3 p. 5-
1 p.
artikel
40 Crime and gambling 1980
3 p. 19-
1 p.
artikel
41 Criminal justice resource manual on computer crime 1980
3 p. 17-18
2 p.
artikel
42 Cut price car parking 1980
3 p. 19-
1 p.
artikel
43 ‘Dark Dante’ finally indicted Menkus, Belden
1993
3 p. 3-
1 p.
artikel
44 Designing Information Systems Security Jackson, Keith
1989
3 p. 15-16
2 p.
artikel
45 Different points of view on fraud 1981
3 p. 11-12
2 p.
artikel
46 Disaster recovery and contingency planning 1990
3 p. 14-15
2 p.
artikel
47 Disaster recovery: before it's too late Ongetta, Silvano
1995
3 p. 10-14
5 p.
artikel
48 Disaster recovery in Kuwait Reda, MustaphaAli
1992
3 p. 7-10
4 p.
artikel
49 Early DEC Windows open into system 1991
3 p. 2-
1 p.
artikel
50 Editorial 1979
3 p. 1-
1 p.
artikel
51 Editorial Comer, Michael
1982
3 p. 1-
1 p.
artikel
52 Editorial Board 1991
3 p. 1-
1 p.
artikel
53 Effective personnel security procedures 1980
3 p. 16-17
2 p.
artikel
54 EFTS insurance lifeline to banking industry 1982
3 p. 1-7
7 p.
artikel
55 EFTS networks 1982
3 p. 7-9
3 p.
artikel
56 Electronic tax return fraud continues to escalate Menkus, Belden
1993
3 p. 2-3
2 p.
artikel
57 Eruocrypt '84 1984
3 p. 11-
1 p.
artikel
58 European initiatives Gannon, Paul
1990
3 p. 4-
1 p.
artikel
59 Evaluation of risk in a telecommunications network Farquhar, Bill
1989
3 p. 9-12
4 p.
artikel
60 Events 1995
3 p. 20-
1 p.
artikel
61 Events 1993
3 p. 20-
1 p.
artikel
62 Events 1991
3 p. 18-19
2 p.
artikel
63 Events 1992
3 p. 18-19
2 p.
artikel
64 Events 1994
3 p. 20-
1 p.
artikel
65 FAT attacker! 1991
3 p. 5-
1 p.
artikel
66 Focus on fraud Clayton, Mark
1979
3 p. 3-6
4 p.
artikel
67 Fraud prevention and computer security for financial institutions — Part 2 Essinger, James
1995
3 p. 16-19
4 p.
artikel
68 Fraud seminars 1986
3 p. 16-
1 p.
artikel
69 French fraud figures released Hill, Phillip
1990
3 p. 4-5
2 p.
artikel
70 From last month's issue… 1984
3 p. 12-
1 p.
artikel
71 Future networks 1979
3 p. 6-7
2 p.
artikel
72 Future seminar 1979
3 p. 11-
1 p.
artikel
73 Hacker leaves threatening messages 1995
3 p. 2-
1 p.
artikel
74 Hard on the heels… 1982
3 p. 15-
1 p.
artikel
75 Helpful hints on buying insurance 1985
3 p. 6-8
3 p.
artikel
76 HMX cipher system Jackson, Keith
1989
3 p. 6-7
2 p.
artikel
77 Hogg Robinson computer risk study 1987
3 p. 1-4
4 p.
artikel
78 Houston hackers attack US agencies Menkus, Belden
1991
3 p. 3-
1 p.
artikel
79 IBM trade secrets 1980
3 p. 18-
1 p.
artikel
80 Identity token usage at American commercial banks Wood, CharlesCresson
1995
3 p. 14-16
3 p.
artikel
81 Inadequate security endangers Gulf plans Meyer, John
1991
3 p. 1-2
2 p.
artikel
82 Interpol spreads its networks Rowe, Mike
1992
3 p. 2-3
2 p.
artikel
83 Introduction to security 1988
3 p. 12-13
2 p.
artikel
84 IP spoofing attacks latest threat 1995
3 p. 1-2
2 p.
artikel
85 Issues and challenges Wong, Ken
1993
3 p. 11-19
9 p.
artikel
86 Italy—new computer crime law Ongetta, Silvano
1994
3 p. 3-
1 p.
artikel
87 “Legal milestone” in UK computer crime law 1988
3 p. 9-10
2 p.
artikel
88 Legal protection of software: Conference 1984
3 p. 10-11
2 p.
artikel
89 Legal software protection in The Netherlands de Pous, Victor A
1986
3 p. 1-5
5 p.
artikel
90 Letter to the editor 1988
3 p. 14-16
3 p.
artikel
91 8LGM hacked through back doors 1993
3 p. 4-
1 p.
artikel
92 Locking out dial access 1983
3 p. 9-10
2 p.
artikel
93 Marketplace 1995
3 p. 4-5
2 p.
artikel
94 Marketplace 1994
3 p. 5-6
2 p.
artikel
95 Marketplace 1992
3 p. 6-
1 p.
artikel
96 Marketplace 1991
3 p. 6-7
2 p.
artikel
97 Marketplace 1990
3 p. 5-6
2 p.
artikel
98 Merrill Lynch takes equity position in PC security manufacturer 1989
3 p. 5-6
2 p.
artikel
99 Microcomputer fraud conference 1986
3 p. 15-
1 p.
artikel
100 Modem maker distributes viruses Menkus, Belden
1991
3 p. 4-
1 p.
artikel
101 More on software protection 1984
3 p. 5-10
6 p.
artikel
102 Morris trial reaches verdict Klopp, Charlotte
1990
3 p. 1-2
2 p.
artikel
103 NCC project on computer security 1984
3 p. 10-
1 p.
artikel
104 Network monitoring attacks 1994
3 p. 1-3
3 p.
artikel
105 New course to beat computer criminal 1980
3 p. 19-20
2 p.
artikel
106 New PCMCIA card offers security and memory English, Erin
1995
3 p. 5-6
2 p.
artikel
107 New products 1991
3 p. 19-20
2 p.
artikel
108 New UK research on computer abuse 1980
3 p. 6-7
2 p.
artikel
109 NIST/NSA release Federal criteria draft 1992
3 p. 3-
1 p.
artikel
110 Norwegian Justice Ministry tightens computer security 1988
3 p. 11-12
2 p.
artikel
111 Novell NetWare and C2 security Carlson, Richard E.
1993
3 p. 5-11
7 p.
artikel
112 Open systems needn't be! Johnson, Mark
1994
3 p. 8-19
12 p.
artikel
113 Password breaking 1984
3 p. 1-5
5 p.
artikel
114 Password thief jailed 1994
3 p. 4-
1 p.
artikel
115 Patents may offer alternative protection Rees, Frank
1995
3 p. 2-3
2 p.
artikel
116 Payroll fraud 1979
3 p. 9-10
2 p.
artikel
117 Power problems plague NYSE Menkus, Belden
1991
3 p. 4-
1 p.
artikel
118 Protecting computer facilities - has management lost sight of the basics? 1987
3 p. 5-8
4 p.
artikel
119 Protecting information from internet threats Wright, MarieA.
1995
3 p. 6-10
5 p.
artikel
120 Publication review 1982
3 p. 15-16
2 p.
artikel
121 Qyz probation 1981
3 p. 4-
1 p.
artikel
122 Recent developments in disaster recovery planning Wong, Ken
1989
3 p. 12-14
3 p.
artikel
123 Revlon and Logisticon settle differences 1991
3 p. 3-4
2 p.
artikel
124 Ristol found not guilty: Blames associate 1980
3 p. 19-
1 p.
artikel
125 Russians better at fighting phone fraud 1995
3 p. 2-
1 p.
artikel
126 Security accuracy and privacy 1979
3 p. 12-
1 p.
artikel
127 Security and X.400 systems Swain, Nick
1992
3 p. 10-15
6 p.
artikel
128 Security chips for British Telecom 1986
3 p. 14-
1 p.
artikel
129 Security for internet e-mail 1991
3 p. 2-3
2 p.
artikel
130 Security of premises: a manual for managers Watt, Steve
1989
3 p. 14-15
2 p.
artikel
131 Security services shaken by UK hacker's claims Wilding, Edward
1989
3 p. 1-5
5 p.
artikel
132 Selecting the right file interrogation tool 1990
3 p. 6-10
5 p.
artikel
133 Seminar report 1979
3 p. 10-11
2 p.
artikel
134 Software piracy 1985
3 p. 1-6
6 p.
artikel
135 Software piracy suits settled out of court 1992
3 p. 4-
1 p.
artikel
136 Software protection device 1983
3 p. 10-11
2 p.
artikel
137 Sponsorship for security research 1990
3 p. 5-
1 p.
artikel
138 Staying ahead of the one minute manager and 59 second employee 1985
3 p. 8-15
8 p.
artikel
139 Stop press 1995
3 p. 20-
1 p.
artikel
140 Stop press 1994
3 p. 20-
1 p.
artikel
141 Stop press Dunlap, Charlotte
1993
3 p. 20-
1 p.
artikel
142 Stop press 1991
3 p. 20-
1 p.
artikel
143 Stop press 1990
3 p. 16-
1 p.
artikel
144 Survey of computer fraud & abuse 1993 1994
3 p. 4-5
2 p.
artikel
145 Survey questionnaire 1979
3 p. 11-12
2 p.
artikel
146 Technical evaluation Jackson, KeithM.
1988
3 p. 1-4
4 p.
artikel
147 Technobank 1984
3 p. 11-
1 p.
artikel
148 Terrorism — counting the costs 1979
3 p. 2-3
2 p.
artikel
149 The Asian piracy problem 1995
3 p. 4-
1 p.
artikel
150 The cost of uncertainty 1990
3 p. 11-14
4 p.
artikel
151 The Los Angeles earthquake Menkus, Belden
1994
3 p. 6-7
2 p.
artikel
152 The prevention and detection of computer fraud Tantam, Mark
1991
3 p. 17-18
2 p.
artikel
153 The Security, Audit and Control of Databases Doyle, Sean D.
1992
3 p. 17-18
2 p.
artikel
154 The Spanish point of view Ripol, Santiago
1992
3 p. 15-17
3 p.
artikel
155 The worldwide encryption market 1992
3 p. 5-
1 p.
artikel
156 The writing on the screen 1981
3 p. 4-
1 p.
artikel
157 Things go better on coke 1985
3 p. 15-
1 p.
artikel
158 “Time Bomb” training film 1983
3 p. 12-
1 p.
artikel
159 Two jailed for disk theft 1992
3 p. 3-
1 p.
artikel
160 UK courts refuse computer evidence 1992
3 p. 1-2
2 p.
artikel
161 UK Data Protection Act provisions may improve computer security 1988
3 p. 8-
1 p.
artikel
162 UK Government computers wide-open to fraud, says report 1988
3 p. 8-9
2 p.
artikel
163 UK police investigate hacking 1992
3 p. 4-
1 p.
artikel
164 US army continues virus research Menkus, Belden
1992
3 p. 2-
1 p.
artikel
165 Verifying the AIDS disk: Is your PC clean? 1990
3 p. 2-3
2 p.
artikel
166 Viewpoint Madsen, Wayne
1992
3 p. 19-20
2 p.
artikel
167 Viruses invade Southeast Asia 1990
3 p. 5-
1 p.
artikel
168 Virus survey 1992
3 p. 5-6
2 p.
artikel
169 Waugh and peace 1981
3 p. 4-6
3 p.
artikel
170 What's in a name? 1986
3 p. 14-
1 p.
artikel
171 Whose job is it to detect fraud? 1981
3 p. 1-3
3 p.
artikel
172 Why authenticate messages? 1987
3 p. 8-12
5 p.
artikel
173 Windows virus 1993
3 p. 4-5
2 p.
artikel
174 World Trade Center bombing tests disaster recovery Moeller, Mike
1993
3 p. 1-2
2 p.
artikel
175 Young hackers send flowers to police 1988
3 p. 10-11
2 p.
artikel
                             175 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland