nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Administrative controls for password-based computer access control systems
|
Wood, CharlesCresson |
|
1986 |
|
3 |
p. 5-13 9 p. |
artikel |
2 |
Advanced EDP seminar
|
|
|
1984 |
|
3 |
p. 11-12 2 p. |
artikel |
3 |
Amdahl ships defective disk drives
|
Menkus, Belden |
|
1992 |
|
3 |
p. 3-4 2 p. |
artikel |
4 |
Anti-virus products—some questions answered
|
Hruska, Jan |
|
1989 |
|
3 |
p. 7-9 3 p. |
artikel |
5 |
A pat on the back for the met
|
|
|
1980 |
|
3 |
p. 7-8 2 p. |
artikel |
6 |
A risk-ranking technique
|
|
|
1982 |
|
3 |
p. 9-14 6 p. |
artikel |
7 |
AT&T and VLSI offer data security
|
|
|
1995 |
|
3 |
p. 4- 1 p. |
artikel |
8 |
Auditing through the computer: A critique
|
Moffett, JD |
|
1980 |
|
3 |
p. 8-15 8 p. |
artikel |
9 |
BA's computerized dirty tricks campaign
|
|
|
1993 |
|
3 |
p. 4- 1 p. |
artikel |
10 |
Bomber stalks internet
|
Zajac, Bernard P. |
|
1994 |
|
3 |
p. 7-8 2 p. |
artikel |
11 |
BR complains about counterfeit NetWare
|
|
|
1995 |
|
3 |
p. 4- 1 p. |
artikel |
12 |
Campaigning for real software
|
|
|
1990 |
|
3 |
p. 3-4 2 p. |
artikel |
13 |
Canadians convict first computer pirate
|
|
|
1991 |
|
3 |
p. 4- 1 p. |
artikel |
14 |
Car rental chain former owners charged with computer frauds
|
Menkus, Belden |
|
1993 |
|
3 |
p. 3-4 2 p. |
artikel |
15 |
Challenge to US computer fraud & abuse act
|
|
|
1991 |
|
3 |
p. 5-6 2 p. |
artikel |
16 |
Chip, Gooseberry and Dirty Dan teach kids how to use a computer
|
Moeller, Mike |
|
1993 |
|
3 |
p. 3- 1 p. |
artikel |
17 |
Clipper chip compromise proposed
|
Riggs, Brian |
|
1994 |
|
3 |
p. 4- 1 p. |
artikel |
18 |
Commonsense computer security
|
Smith, M.R. |
|
1991 |
|
3 |
p. 7-15 9 p. |
artikel |
19 |
COMPSEC '86
|
|
|
1986 |
|
3 |
p. 15- 1 p. |
artikel |
20 |
Compsec '87
|
|
|
1987 |
|
3 |
p. 12- 1 p. |
artikel |
21 |
Computer audit and systems development
|
|
|
1988 |
|
3 |
p. 5-7 3 p. |
artikel |
22 |
Computer, business and security
|
|
|
1988 |
|
3 |
p. 13-14 2 p. |
artikel |
23 |
Computer crime - kids' stuff?
|
|
|
1981 |
|
3 |
p. 9-11 3 p. |
artikel |
24 |
Computer error cripples school income
|
Menkus, Belden |
|
1992 |
|
3 |
p. 5- 1 p. |
artikel |
25 |
Computer fraud penalty laws in Norway
|
|
|
1986 |
|
3 |
p. 14- 1 p. |
artikel |
26 |
Computer fraud survey
|
|
|
1981 |
|
3 |
p. 3-4 2 p. |
artikel |
27 |
Computer media — cleaning up the weak link
|
Malcolm, Alan |
|
1991 |
|
3 |
p. 15-17 3 p. |
artikel |
28 |
Computer people
|
|
|
1979 |
|
3 |
p. 8-9 2 p. |
artikel |
29 |
Computer risk manager
|
|
|
1990 |
|
3 |
p. 16- 1 p. |
artikel |
30 |
Computers and the law
|
|
|
1981 |
|
3 |
p. 6-9 4 p. |
artikel |
31 |
Computer Security Institute
|
|
|
1979 |
|
3 |
p. 12- 1 p. |
artikel |
32 |
Computer security products
|
|
|
1990 |
|
3 |
p. 16- 1 p. |
artikel |
33 |
Computers & security journal
|
|
|
1990 |
|
3 |
p. 15-16 2 p. |
artikel |
34 |
Confusing the issue?
|
|
|
1983 |
|
3 |
p. 11- 1 p. |
artikel |
35 |
Contingency planning
|
|
|
1982 |
|
3 |
p. 14-15 2 p. |
artikel |
36 |
Contingency planning and security: The auditor's challenge
|
|
|
1983 |
|
3 |
p. 1-9 9 p. |
artikel |
37 |
Convincing senior managers of the need for security
|
|
|
1980 |
|
3 |
p. 1-6 6 p. |
artikel |
38 |
Copyright amendment
|
|
|
1985 |
|
3 |
p. 16- 1 p. |
artikel |
39 |
Court case round-ups
|
|
|
1991 |
|
3 |
p. 5- 1 p. |
artikel |
40 |
Crime and gambling
|
|
|
1980 |
|
3 |
p. 19- 1 p. |
artikel |
41 |
Criminal justice resource manual on computer crime
|
|
|
1980 |
|
3 |
p. 17-18 2 p. |
artikel |
42 |
Cut price car parking
|
|
|
1980 |
|
3 |
p. 19- 1 p. |
artikel |
43 |
‘Dark Dante’ finally indicted
|
Menkus, Belden |
|
1993 |
|
3 |
p. 3- 1 p. |
artikel |
44 |
Designing Information Systems Security
|
Jackson, Keith |
|
1989 |
|
3 |
p. 15-16 2 p. |
artikel |
45 |
Different points of view on fraud
|
|
|
1981 |
|
3 |
p. 11-12 2 p. |
artikel |
46 |
Disaster recovery and contingency planning
|
|
|
1990 |
|
3 |
p. 14-15 2 p. |
artikel |
47 |
Disaster recovery: before it's too late
|
Ongetta, Silvano |
|
1995 |
|
3 |
p. 10-14 5 p. |
artikel |
48 |
Disaster recovery in Kuwait
|
Reda, MustaphaAli |
|
1992 |
|
3 |
p. 7-10 4 p. |
artikel |
49 |
Early DEC Windows open into system
|
|
|
1991 |
|
3 |
p. 2- 1 p. |
artikel |
50 |
Editorial
|
|
|
1979 |
|
3 |
p. 1- 1 p. |
artikel |
51 |
Editorial
|
Comer, Michael |
|
1982 |
|
3 |
p. 1- 1 p. |
artikel |
52 |
Editorial Board
|
|
|
1991 |
|
3 |
p. 1- 1 p. |
artikel |
53 |
Effective personnel security procedures
|
|
|
1980 |
|
3 |
p. 16-17 2 p. |
artikel |
54 |
EFTS insurance lifeline to banking industry
|
|
|
1982 |
|
3 |
p. 1-7 7 p. |
artikel |
55 |
EFTS networks
|
|
|
1982 |
|
3 |
p. 7-9 3 p. |
artikel |
56 |
Electronic tax return fraud continues to escalate
|
Menkus, Belden |
|
1993 |
|
3 |
p. 2-3 2 p. |
artikel |
57 |
Eruocrypt '84
|
|
|
1984 |
|
3 |
p. 11- 1 p. |
artikel |
58 |
European initiatives
|
Gannon, Paul |
|
1990 |
|
3 |
p. 4- 1 p. |
artikel |
59 |
Evaluation of risk in a telecommunications network
|
Farquhar, Bill |
|
1989 |
|
3 |
p. 9-12 4 p. |
artikel |
60 |
Events
|
|
|
1995 |
|
3 |
p. 20- 1 p. |
artikel |
61 |
Events
|
|
|
1993 |
|
3 |
p. 20- 1 p. |
artikel |
62 |
Events
|
|
|
1991 |
|
3 |
p. 18-19 2 p. |
artikel |
63 |
Events
|
|
|
1992 |
|
3 |
p. 18-19 2 p. |
artikel |
64 |
Events
|
|
|
1994 |
|
3 |
p. 20- 1 p. |
artikel |
65 |
FAT attacker!
|
|
|
1991 |
|
3 |
p. 5- 1 p. |
artikel |
66 |
Focus on fraud
|
Clayton, Mark |
|
1979 |
|
3 |
p. 3-6 4 p. |
artikel |
67 |
Fraud prevention and computer security for financial institutions — Part 2
|
Essinger, James |
|
1995 |
|
3 |
p. 16-19 4 p. |
artikel |
68 |
Fraud seminars
|
|
|
1986 |
|
3 |
p. 16- 1 p. |
artikel |
69 |
French fraud figures released
|
Hill, Phillip |
|
1990 |
|
3 |
p. 4-5 2 p. |
artikel |
70 |
From last month's issue…
|
|
|
1984 |
|
3 |
p. 12- 1 p. |
artikel |
71 |
Future networks
|
|
|
1979 |
|
3 |
p. 6-7 2 p. |
artikel |
72 |
Future seminar
|
|
|
1979 |
|
3 |
p. 11- 1 p. |
artikel |
73 |
Hacker leaves threatening messages
|
|
|
1995 |
|
3 |
p. 2- 1 p. |
artikel |
74 |
Hard on the heels…
|
|
|
1982 |
|
3 |
p. 15- 1 p. |
artikel |
75 |
Helpful hints on buying insurance
|
|
|
1985 |
|
3 |
p. 6-8 3 p. |
artikel |
76 |
HMX cipher system
|
Jackson, Keith |
|
1989 |
|
3 |
p. 6-7 2 p. |
artikel |
77 |
Hogg Robinson computer risk study
|
|
|
1987 |
|
3 |
p. 1-4 4 p. |
artikel |
78 |
Houston hackers attack US agencies
|
Menkus, Belden |
|
1991 |
|
3 |
p. 3- 1 p. |
artikel |
79 |
IBM trade secrets
|
|
|
1980 |
|
3 |
p. 18- 1 p. |
artikel |
80 |
Identity token usage at American commercial banks
|
Wood, CharlesCresson |
|
1995 |
|
3 |
p. 14-16 3 p. |
artikel |
81 |
Inadequate security endangers Gulf plans
|
Meyer, John |
|
1991 |
|
3 |
p. 1-2 2 p. |
artikel |
82 |
Interpol spreads its networks
|
Rowe, Mike |
|
1992 |
|
3 |
p. 2-3 2 p. |
artikel |
83 |
Introduction to security
|
|
|
1988 |
|
3 |
p. 12-13 2 p. |
artikel |
84 |
IP spoofing attacks latest threat
|
|
|
1995 |
|
3 |
p. 1-2 2 p. |
artikel |
85 |
Issues and challenges
|
Wong, Ken |
|
1993 |
|
3 |
p. 11-19 9 p. |
artikel |
86 |
Italy—new computer crime law
|
Ongetta, Silvano |
|
1994 |
|
3 |
p. 3- 1 p. |
artikel |
87 |
“Legal milestone” in UK computer crime law
|
|
|
1988 |
|
3 |
p. 9-10 2 p. |
artikel |
88 |
Legal protection of software: Conference
|
|
|
1984 |
|
3 |
p. 10-11 2 p. |
artikel |
89 |
Legal software protection in The Netherlands
|
de Pous, Victor A |
|
1986 |
|
3 |
p. 1-5 5 p. |
artikel |
90 |
Letter to the editor
|
|
|
1988 |
|
3 |
p. 14-16 3 p. |
artikel |
91 |
8LGM hacked through back doors
|
|
|
1993 |
|
3 |
p. 4- 1 p. |
artikel |
92 |
Locking out dial access
|
|
|
1983 |
|
3 |
p. 9-10 2 p. |
artikel |
93 |
Marketplace
|
|
|
1995 |
|
3 |
p. 4-5 2 p. |
artikel |
94 |
Marketplace
|
|
|
1994 |
|
3 |
p. 5-6 2 p. |
artikel |
95 |
Marketplace
|
|
|
1992 |
|
3 |
p. 6- 1 p. |
artikel |
96 |
Marketplace
|
|
|
1991 |
|
3 |
p. 6-7 2 p. |
artikel |
97 |
Marketplace
|
|
|
1990 |
|
3 |
p. 5-6 2 p. |
artikel |
98 |
Merrill Lynch takes equity position in PC security manufacturer
|
|
|
1989 |
|
3 |
p. 5-6 2 p. |
artikel |
99 |
Microcomputer fraud conference
|
|
|
1986 |
|
3 |
p. 15- 1 p. |
artikel |
100 |
Modem maker distributes viruses
|
Menkus, Belden |
|
1991 |
|
3 |
p. 4- 1 p. |
artikel |
101 |
More on software protection
|
|
|
1984 |
|
3 |
p. 5-10 6 p. |
artikel |
102 |
Morris trial reaches verdict
|
Klopp, Charlotte |
|
1990 |
|
3 |
p. 1-2 2 p. |
artikel |
103 |
NCC project on computer security
|
|
|
1984 |
|
3 |
p. 10- 1 p. |
artikel |
104 |
Network monitoring attacks
|
|
|
1994 |
|
3 |
p. 1-3 3 p. |
artikel |
105 |
New course to beat computer criminal
|
|
|
1980 |
|
3 |
p. 19-20 2 p. |
artikel |
106 |
New PCMCIA card offers security and memory
|
English, Erin |
|
1995 |
|
3 |
p. 5-6 2 p. |
artikel |
107 |
New products
|
|
|
1991 |
|
3 |
p. 19-20 2 p. |
artikel |
108 |
New UK research on computer abuse
|
|
|
1980 |
|
3 |
p. 6-7 2 p. |
artikel |
109 |
NIST/NSA release Federal criteria draft
|
|
|
1992 |
|
3 |
p. 3- 1 p. |
artikel |
110 |
Norwegian Justice Ministry tightens computer security
|
|
|
1988 |
|
3 |
p. 11-12 2 p. |
artikel |
111 |
Novell NetWare and C2 security
|
Carlson, Richard E. |
|
1993 |
|
3 |
p. 5-11 7 p. |
artikel |
112 |
Open systems needn't be!
|
Johnson, Mark |
|
1994 |
|
3 |
p. 8-19 12 p. |
artikel |
113 |
Password breaking
|
|
|
1984 |
|
3 |
p. 1-5 5 p. |
artikel |
114 |
Password thief jailed
|
|
|
1994 |
|
3 |
p. 4- 1 p. |
artikel |
115 |
Patents may offer alternative protection
|
Rees, Frank |
|
1995 |
|
3 |
p. 2-3 2 p. |
artikel |
116 |
Payroll fraud
|
|
|
1979 |
|
3 |
p. 9-10 2 p. |
artikel |
117 |
Power problems plague NYSE
|
Menkus, Belden |
|
1991 |
|
3 |
p. 4- 1 p. |
artikel |
118 |
Protecting computer facilities - has management lost sight of the basics?
|
|
|
1987 |
|
3 |
p. 5-8 4 p. |
artikel |
119 |
Protecting information from internet threats
|
Wright, MarieA. |
|
1995 |
|
3 |
p. 6-10 5 p. |
artikel |
120 |
Publication review
|
|
|
1982 |
|
3 |
p. 15-16 2 p. |
artikel |
121 |
Qyz probation
|
|
|
1981 |
|
3 |
p. 4- 1 p. |
artikel |
122 |
Recent developments in disaster recovery planning
|
Wong, Ken |
|
1989 |
|
3 |
p. 12-14 3 p. |
artikel |
123 |
Revlon and Logisticon settle differences
|
|
|
1991 |
|
3 |
p. 3-4 2 p. |
artikel |
124 |
Ristol found not guilty: Blames associate
|
|
|
1980 |
|
3 |
p. 19- 1 p. |
artikel |
125 |
Russians better at fighting phone fraud
|
|
|
1995 |
|
3 |
p. 2- 1 p. |
artikel |
126 |
Security accuracy and privacy
|
|
|
1979 |
|
3 |
p. 12- 1 p. |
artikel |
127 |
Security and X.400 systems
|
Swain, Nick |
|
1992 |
|
3 |
p. 10-15 6 p. |
artikel |
128 |
Security chips for British Telecom
|
|
|
1986 |
|
3 |
p. 14- 1 p. |
artikel |
129 |
Security for internet e-mail
|
|
|
1991 |
|
3 |
p. 2-3 2 p. |
artikel |
130 |
Security of premises: a manual for managers
|
Watt, Steve |
|
1989 |
|
3 |
p. 14-15 2 p. |
artikel |
131 |
Security services shaken by UK hacker's claims
|
Wilding, Edward |
|
1989 |
|
3 |
p. 1-5 5 p. |
artikel |
132 |
Selecting the right file interrogation tool
|
|
|
1990 |
|
3 |
p. 6-10 5 p. |
artikel |
133 |
Seminar report
|
|
|
1979 |
|
3 |
p. 10-11 2 p. |
artikel |
134 |
Software piracy
|
|
|
1985 |
|
3 |
p. 1-6 6 p. |
artikel |
135 |
Software piracy suits settled out of court
|
|
|
1992 |
|
3 |
p. 4- 1 p. |
artikel |
136 |
Software protection device
|
|
|
1983 |
|
3 |
p. 10-11 2 p. |
artikel |
137 |
Sponsorship for security research
|
|
|
1990 |
|
3 |
p. 5- 1 p. |
artikel |
138 |
Staying ahead of the one minute manager and 59 second employee
|
|
|
1985 |
|
3 |
p. 8-15 8 p. |
artikel |
139 |
Stop press
|
|
|
1995 |
|
3 |
p. 20- 1 p. |
artikel |
140 |
Stop press
|
|
|
1994 |
|
3 |
p. 20- 1 p. |
artikel |
141 |
Stop press
|
Dunlap, Charlotte |
|
1993 |
|
3 |
p. 20- 1 p. |
artikel |
142 |
Stop press
|
|
|
1991 |
|
3 |
p. 20- 1 p. |
artikel |
143 |
Stop press
|
|
|
1990 |
|
3 |
p. 16- 1 p. |
artikel |
144 |
Survey of computer fraud & abuse 1993
|
|
|
1994 |
|
3 |
p. 4-5 2 p. |
artikel |
145 |
Survey questionnaire
|
|
|
1979 |
|
3 |
p. 11-12 2 p. |
artikel |
146 |
Technical evaluation
|
Jackson, KeithM. |
|
1988 |
|
3 |
p. 1-4 4 p. |
artikel |
147 |
Technobank
|
|
|
1984 |
|
3 |
p. 11- 1 p. |
artikel |
148 |
Terrorism — counting the costs
|
|
|
1979 |
|
3 |
p. 2-3 2 p. |
artikel |
149 |
The Asian piracy problem
|
|
|
1995 |
|
3 |
p. 4- 1 p. |
artikel |
150 |
The cost of uncertainty
|
|
|
1990 |
|
3 |
p. 11-14 4 p. |
artikel |
151 |
The Los Angeles earthquake
|
Menkus, Belden |
|
1994 |
|
3 |
p. 6-7 2 p. |
artikel |
152 |
The prevention and detection of computer fraud
|
Tantam, Mark |
|
1991 |
|
3 |
p. 17-18 2 p. |
artikel |
153 |
The Security, Audit and Control of Databases
|
Doyle, Sean D. |
|
1992 |
|
3 |
p. 17-18 2 p. |
artikel |
154 |
The Spanish point of view
|
Ripol, Santiago |
|
1992 |
|
3 |
p. 15-17 3 p. |
artikel |
155 |
The worldwide encryption market
|
|
|
1992 |
|
3 |
p. 5- 1 p. |
artikel |
156 |
The writing on the screen
|
|
|
1981 |
|
3 |
p. 4- 1 p. |
artikel |
157 |
Things go better on coke
|
|
|
1985 |
|
3 |
p. 15- 1 p. |
artikel |
158 |
“Time Bomb” training film
|
|
|
1983 |
|
3 |
p. 12- 1 p. |
artikel |
159 |
Two jailed for disk theft
|
|
|
1992 |
|
3 |
p. 3- 1 p. |
artikel |
160 |
UK courts refuse computer evidence
|
|
|
1992 |
|
3 |
p. 1-2 2 p. |
artikel |
161 |
UK Data Protection Act provisions may improve computer security
|
|
|
1988 |
|
3 |
p. 8- 1 p. |
artikel |
162 |
UK Government computers wide-open to fraud, says report
|
|
|
1988 |
|
3 |
p. 8-9 2 p. |
artikel |
163 |
UK police investigate hacking
|
|
|
1992 |
|
3 |
p. 4- 1 p. |
artikel |
164 |
US army continues virus research
|
Menkus, Belden |
|
1992 |
|
3 |
p. 2- 1 p. |
artikel |
165 |
Verifying the AIDS disk: Is your PC clean?
|
|
|
1990 |
|
3 |
p. 2-3 2 p. |
artikel |
166 |
Viewpoint
|
Madsen, Wayne |
|
1992 |
|
3 |
p. 19-20 2 p. |
artikel |
167 |
Viruses invade Southeast Asia
|
|
|
1990 |
|
3 |
p. 5- 1 p. |
artikel |
168 |
Virus survey
|
|
|
1992 |
|
3 |
p. 5-6 2 p. |
artikel |
169 |
Waugh and peace
|
|
|
1981 |
|
3 |
p. 4-6 3 p. |
artikel |
170 |
What's in a name?
|
|
|
1986 |
|
3 |
p. 14- 1 p. |
artikel |
171 |
Whose job is it to detect fraud?
|
|
|
1981 |
|
3 |
p. 1-3 3 p. |
artikel |
172 |
Why authenticate messages?
|
|
|
1987 |
|
3 |
p. 8-12 5 p. |
artikel |
173 |
Windows virus
|
|
|
1993 |
|
3 |
p. 4-5 2 p. |
artikel |
174 |
World Trade Center bombing tests disaster recovery
|
Moeller, Mike |
|
1993 |
|
3 |
p. 1-2 2 p. |
artikel |
175 |
Young hackers send flowers to police
|
|
|
1988 |
|
3 |
p. 10-11 2 p. |
artikel |