Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             191 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Access control software survey 1988
4 p. 14-
1 p.
artikel
2 Advice on contingency planning 1981
4 p. 9-
1 p.
artikel
3 A focus on service quality Calder, Alizabeth V.
1992
4 p. 9-13
5 p.
artikel
4 Airbus tragedy throws doubt over safety-critical software 1992
4 p. 2-
1 p.
artikel
5 …And a bill to cover it 1983
4 p. 12-
1 p.
artikel
6 An important reminder Wolfe, HenryB.
1995
4 p. 16-18
3 p.
artikel
7 An overview of the products Williams, Paul
1990
4 p. 7-12
6 p.
artikel
8 Apathy to computer crime ‘astounding’ Rees, Frank
1989
4 p. 4-
1 p.
artikel
9 A point to remember 1986
4 p. 2-
1 p.
artikel
10 A policy for a large multinational Lacey, David
1991
4 p. 13-18
6 p.
artikel
11 A reply to criticism 1986
4 p. 16-
1 p.
artikel
12 Are viruses underestimated? 1991
4 p. 3-
1 p.
artikel
13 Ashton-Tate helps introduce new copyright law in Spain 1988
4 p. 12-13
2 p.
artikel
14 Association of software protection 1983
4 p. 11-
1 p.
artikel
15 AT&T aligns with VLSI for cryptography chips Zajac Jr., BernardP.
1995
4 p. 6-
1 p.
artikel
16 Attitudes to fraud in banks 1980
4 p. 9-10
2 p.
artikel
17 Auditing - up to standard? 1981
4 p. 5-9
5 p.
artikel
18 Australia re-examines software copyright 1989
4 p. 3-4
2 p.
artikel
19 Author of aids disk arrested Sterlicchi, John
1990
4 p. 1-2
2 p.
artikel
20 Autodialler attacks American Honda Menkus, Belden
1992
4 p. 1-2
2 p.
artikel
21 BA accused of further hacking 1994
4 p. 4-
1 p.
artikel
22 Bank of England security guidelines 1985
4 p. 5-10
6 p.
artikel
23 Bell Atlantic to survey US security industry 1987
4 p. 13-
1 p.
artikel
24 Biometric identification systems update Smith, Jack
1993
4 p. 6-8
3 p.
artikel
25 Biometrics: the only positive identification Wilding, Edward
1989
4 p. 21-22
2 p.
artikel
26 British hackers hacked off 1985
4 p. 4-5
2 p.
artikel
27 Buy only from reliable sources 1989
4 p. 19-20
2 p.
artikel
28 ‘Call forwarding’ used to steal competitors' business Menkus, Belden
1995
4 p. 3-4
2 p.
artikel
29 Canadian agency monitors phone and fax 1994
4 p. 2-
1 p.
artikel
30 Card watch reducing fraud Smith, Jack
1993
4 p. 2-3
2 p.
artikel
31 Case history of a virus attack Highland, HaroldJ.
1988
4 p. 4-7
4 p.
artikel
32 Case study 1979
4 p. 7-8
2 p.
artikel
33 CC:Mail users beware Moeller, Mike
1994
4 p. 6-7
2 p.
artikel
34 CIAC warns of serious NCSA WWW vulnerability 1995
4 p. 2-3
2 p.
artikel
35 Clinton approves Clipper, fails to relax export controls Madsen, Wayne
1994
4 p. 7-9
3 p.
artikel
36 Company code of conduct for computer systems 1984
4 p. 1-2
2 p.
artikel
37 Computer audit 1979
4 p. 2-5
4 p.
artikel
38 Computer crime 1986: An update of case history statistics 1987
4 p. 1-9
9 p.
artikel
39 Computer crime: Security techniques 1983
4 p. 1-9
9 p.
artikel
40 Computer fraud down under 1984
4 p. 3-
1 p.
artikel
41 Computerized personnel assessment 1980
4 p. 7-
1 p.
artikel
42 Computerized VAT fraud 1987
4 p. 10-11
2 p.
artikel
43 Computer law journal 1980
4 p. 2-4
3 p.
artikel
44 Computer security breaches affect half UK industry 1992
4 p. 6-9
4 p.
artikel
45 Computer security — comprehensive controls checklist Watt, Steve
1988
4 p. 15-16
2 p.
artikel
46 Computer security products 1990
4 p. 20-
1 p.
artikel
47 Computer security surveys Collinson, Helen
1995
4 p. 8-10
3 p.
artikel
48 Computers give inadmissible evidence 1980
4 p. 10-11
2 p.
artikel
49 Computers & Security journal 1990
4 p. 20-
1 p.
artikel
50 Conference file 1987
4 p. 15-16
2 p.
artikel
51 Control risks forms new computer security company 1989
4 p. 3-
1 p.
artikel
52 Copyright piracy trade war averted 1995
4 p. 4-
1 p.
artikel
53 Corporate Computer Security '90 1990
4 p. 6-7
2 p.
artikel
54 Counter spy shopping 1980
4 p. 6-7
2 p.
artikel
55 Database security and integrity 1982
4 p. 11-12
2 p.
artikel
56 Datatheft: Computer fraud, industrial espionage and information crime Jackson, Keith
1988
4 p. 14-15
2 p.
artikel
57 DEC appoints European security manager 1987
4 p. 11-12
2 p.
artikel
58 Definitions 1979
4 p. 9-
1 p.
artikel
59 Dutch security system breached 1980
4 p. 1-2
2 p.
artikel
60 Editorial afterword 1980
4 p. 12-
1 p.
artikel
61 Editorial Board 1991
4 p. 1-
1 p.
artikel
62 Editorial Board 1990
4 p. 1-
1 p.
artikel
63 EDP risk insurance matrix 1982
4 p. 1-8
8 p.
artikel
64 Electronic data interchange, open networks and business security Draper, John
1989
4 p. 4-12
9 p.
artikel
65 Electronic Piggybacking Gregg, John
1982
4 p. 8-10
3 p.
artikel
66 Electronic signature — the key to mobility Nilson, Åke
1993
4 p. 17-19
3 p.
artikel
67 Emergency services hacked 1990
4 p. 4-5
2 p.
artikel
68 Encryption Toolkit available on VAX/VMS 1987
4 p. 14-15
2 p.
artikel
69 European Security Forum growing rapidly 1990
4 p. 5-
1 p.
artikel
70 Events 1995
4 p. 20-
1 p.
artikel
71 Events 1994
4 p. 19-20
2 p.
artikel
72 Events 1992
4 p. 19-
1 p.
artikel
73 Events 1993
4 p. 19-20
2 p.
artikel
74 Events 1991
4 p. 19-20
2 p.
artikel
75 Events 1990
4 p. 18-19
2 p.
artikel
76 Faulty BASF tape cartridges 1992
4 p. 4-5
2 p.
artikel
77 Fight the smugglers to beat the pirates 1993
4 p. 5-
1 p.
artikel
78 Fire damage retrieval 1982
4 p. 10-11
2 p.
artikel
79 First UK hacker conviction upheld 1991
4 p. 4-
1 p.
artikel
80 Ford pays over the odds 1979
4 p. 5-
1 p.
artikel
81 Fraud Watch: A Guide for Business Sommer, Peter
1995
4 p. 18-19
2 p.
artikel
82 Government data network contract goes to sophos 1989
4 p. 3-
1 p.
artikel
83 Growing interest in anti-eavesdropping devices 1987
4 p. 9-10
2 p.
artikel
84 Hacker acquitted on ‘addiction’ defence 1993
4 p. 2-
1 p.
artikel
85 Hacker needed money for university education 1993
4 p. 5-
1 p.
artikel
86 Hackers clean driving licences for profit? 1986
4 p. 14-
1 p.
artikel
87 Hackers switch sides and become encryption developers Moeller, Mike
1993
4 p. 4-5
2 p.
artikel
88 Health insurance fraud claims settled Menkus, Belden
1993
4 p. 4-
1 p.
artikel
89 Hong Kong police shut down networks 1995
4 p. 4-
1 p.
artikel
90 Hot to spot a false purchase invoice 1979
4 p. 10-12
3 p.
artikel
91 How to protect ourselves from information Ongetta, Silvano
1995
4 p. 13-16
4 p.
artikel
92 How to protect your data 1986
4 p. 14-16
3 p.
artikel
93 Hunting the snark Cripps, Benjamin
1990
4 p. 12-16
5 p.
artikel
94 IBM VM CMS 4 open to a virus attack 1989
4 p. 20-
1 p.
artikel
95 ICL markets VME high security option 1988
4 p. 7-9
3 p.
artikel
96 Imitating bar codes 1985
4 p. 1-2
2 p.
artikel
97 Information security in financial services Sommer, Peter
1992
4 p. 20-
1 p.
artikel
98 Integrated test facility 1979
4 p. 6-7
2 p.
artikel
99 IRS faces increasing fraud 1994
4 p. 3-
1 p.
artikel
100 Italy and computer crimes (better late than never) Ongetta, Silvano
1994
4 p. 16-19
4 p.
artikel
101 Italy — Virus diffusion Ongetta, Silvano
1994
4 p. 3-
1 p.
artikel
102 Japan “haven for hackers” 1987
4 p. 11-
1 p.
artikel
103 KGB hackers receive sentencing Gliss, Hans
1990
4 p. 2-3
2 p.
artikel
104 Kids' stuff 1981
4 p. 9-10
2 p.
artikel
105 Legislation to protect chips 1989
4 p. 4-
1 p.
artikel
106 Lessons from disaster victims Wong, Ken
1994
4 p. 10-16
7 p.
artikel
107 Letters to the editor 1980
4 p. 7-9
3 p.
artikel
108 Logic bomber fined $5000 Menkus, Belden
1992
4 p. 2-
1 p.
artikel
109 Low-cost protection against electromagnetic eavesdropping 1989
4 p. 1-2
2 p.
artikel
110 Management responsibilities 1980
4 p. 11-12
2 p.
artikel
111 Marconi awarded secure data contract 1988
4 p. 13-
1 p.
artikel
112 Marketplace 1995
4 p. 5-
1 p.
artikel
113 Marketplace 1993
4 p. 5-6
2 p.
artikel
114 Marketplace 1992
4 p. 5-6
2 p.
artikel
115 Marketplace 1991
4 p. 5-
1 p.
artikel
116 Marketplace 1994
4 p. 4-6
3 p.
artikel
117 Marketplace 1990
4 p. 5-6
2 p.
artikel
118 Master hacker indicted again Sommer, Peter
1990
4 p. 3-4
2 p.
artikel
119 Microsoft fights software piracy 1994
4 p. 1-2
2 p.
artikel
120 Mini-computer fraud 1981
4 p. 1-5
5 p.
artikel
121 Miscellaneous bank cases 1985
4 p. 4-
1 p.
artikel
122 Natas spreads in southwestern United States 1995
4 p. 4-5
2 p.
artikel
123 NBS and NSA set up risk management laboratory 1988
4 p. 13-14
2 p.
artikel
124 New data protection registration campaign 1994
4 p. 4-
1 p.
artikel
125 New French security software 1987
4 p. 12-
1 p.
artikel
126 New journal 1982
4 p. 12-
1 p.
artikel
127 New report from Jay Bloombecker 1986
4 p. 1-2
2 p.
artikel
128 New style computer parts thieves captured Menkus, Belden
1993
4 p. 3-
1 p.
artikel
129 NIST seeks views on cryptography 1991
4 p. 3-4
2 p.
artikel
130 Novell ships shrink-wrapped viruses Sterlicchi, John
1992
4 p. 2-4
3 p.
artikel
131 Online auditing using microcomputers Joseph Highland,, Harold
1989
4 p. 23-24
2 p.
artikel
132 Operation Sundevil under fire Klopp, Charlotte
1991
4 p. 1-2
2 p.
artikel
133 OS/400 upgrade bugs 1992
4 p. 5-
1 p.
artikel
134 PC used to steal ¥140 million Menkus, Belden
1995
4 p. 3-
1 p.
artikel
135 Policy implementation at W H Smith's Hollins, Julie D.
1992
4 p. 13-16
4 p.
artikel
136 Power users beware Armstrong, Lisa
1995
4 p. 7-8
2 p.
artikel
137 Product: Norton utilities, advanced edition Jackson, Keith
1989
4 p. 16-19
4 p.
artikel
138 Programming in prison 1983
4 p. 12-
1 p.
artikel
139 Recombinant virus protects network 1994
4 p. 2-3
2 p.
artikel
140 Recruiting trouble 1981
4 p. 11-
1 p.
artikel
141 Review of data privacy: 1992 Madsen, Wayne
1993
4 p. 8-17
10 p.
artikel
142 Risk assessment for ‘con loss’ insurance Sommer, Peter
1989
4 p. 12-16
5 p.
artikel
143 Risk assessment seminar 1989
4 p. 24-
1 p.
artikel
144 Scicon to market safeword in UK 1988
4 p. 11-12
2 p.
artikel
145 Second European conference on computer audit, control and security Paans, Ronald
1988
4 p. 9-11
3 p.
artikel
146 Secret service made to pay $500 000 for unfair raid Dunlap, Charlotte
1993
4 p. 1-2
2 p.
artikel
147 Securing networks Hughes, Tony
1990
4 p. 16-18
3 p.
artikel
148 Security and the data protection act 1984
4 p. 3-12
10 p.
artikel
149 Sintrom launches data encryption system 1987
4 p. 12-13
2 p.
artikel
150 Slowly becoming standard Snell, Monica
1995
4 p. 6-7
2 p.
artikel
151 Software copyright law introduced in Argentina 1994
4 p. 1-
1 p.
artikel
152 Software protection conference 1981
4 p. 11-12
2 p.
artikel
153 Sophos launches public-key encryption system 1987
4 p. 13-14
2 p.
artikel
154 Spectacular computer crime Mulhall, T.
1991
4 p. 18-19
2 p.
artikel
155 Spy-proof glass deters eavesdropping 1991
4 p. 4-5
2 p.
artikel
156 Stop press 1995
4 p. 20-
1 p.
artikel
157 Stop press Dunlap, Charlotte
1993
4 p. 20-
1 p.
artikel
158 Stop press 1991
4 p. 20-
1 p.
artikel
159 Stop press 1994
4 p. 20-
1 p.
artikel
160 Stop press 1990
4 p. 20-
1 p.
artikel
161 ‘1813’ strikes city university Jackson, Keith
1989
4 p. 19-
1 p.
artikel
162 Summary of the 1990 report Charbon, F.H.
1991
4 p. 6-13
8 p.
artikel
163 Sungard virus Armstrong, Lisa
1995
4 p. 7-
1 p.
artikel
164 Survey questionnaire 1979
4 p. 10-
1 p.
artikel
165 Systematic attacks 1981
4 p. 9-
1 p.
artikel
166 Taiwanese piracy sweep 1992
4 p. 5-
1 p.
artikel
167 Technical evaluation — PURGE Jackson, Keith
1988
4 p. 1-4
4 p.
artikel
168 The biggest bank fraud — how big is big? 1985
4 p. 2-3
2 p.
artikel
169 The complete computer virus handbook Jackson, Keith
1989
4 p. 22-23
2 p.
artikel
170 The crime that made the grade 1981
4 p. 10-11
2 p.
artikel
171 The Fed trials security smartcards 1991
4 p. 4-
1 p.
artikel
172 The hacker composite: a necessary security tool? Dwan, Berni
1995
4 p. 10-13
4 p.
artikel
173 The ‘in-word’ 1985
4 p. 10-11
2 p.
artikel
174 The Nilson report 1980
4 p. 4-6
3 p.
artikel
175 The psychological subversion of information systems Sherizen, Sanford
1992
4 p. 17-18
2 p.
artikel
176 The 1st annual CoTRA conference 1990
4 p. 7-
1 p.
artikel
177 The tangled web; an extract 1986
4 p. 2-14
13 p.
artikel
178 Two new viruses pose threat Highland, HaroldJoseph
1989
4 p. 20-21
2 p.
artikel
179 Undetectable crime 1983
4 p. 9-11
3 p.
artikel
180 Undetected glitch leads to lost business 1992
4 p. 4-
1 p.
artikel
181 UNIRAS computer security made public McCormack, Michael
1995
4 p. 1-2
2 p.
artikel
182 US airlines charged with rigging computerized fare lists Menkus, Belden
1993
4 p. 5-
1 p.
artikel
183 US card issuers remain open to fraud Menkus, Belden
1992
4 p. 4-
1 p.
artikel
184 US DoD to test new e-mail security products Steffora, Anne
1994
4 p. 7-
1 p.
artikel
185 Users unaware of distributed information vulnerability Dunlap, Charlotte
1993
4 p. 3-4
2 p.
artikel
186 US most wanted hacker arrested Zajac Jr., BernardP.
1995
4 p. 3-
1 p.
artikel
187 US Treasury requires federal EFT authentication 1987
4 p. 15-
1 p.
artikel
188 Virus insurance from Lloyds of London 1989
4 p. 2-3
2 p.
artikel
189 Visa credit checks go wireless 1991
4 p. 2-
1 p.
artikel
190 Warning message against security risks 1994
4 p. 2-
1 p.
artikel
191 Xephon user survey 1985
4 p. 11-12
2 p.
artikel
                             191 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland