nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access control software survey
|
|
|
1988 |
|
4 |
p. 14- 1 p. |
artikel |
2 |
Advice on contingency planning
|
|
|
1981 |
|
4 |
p. 9- 1 p. |
artikel |
3 |
A focus on service quality
|
Calder, Alizabeth V. |
|
1992 |
|
4 |
p. 9-13 5 p. |
artikel |
4 |
Airbus tragedy throws doubt over safety-critical software
|
|
|
1992 |
|
4 |
p. 2- 1 p. |
artikel |
5 |
…And a bill to cover it
|
|
|
1983 |
|
4 |
p. 12- 1 p. |
artikel |
6 |
An important reminder
|
Wolfe, HenryB. |
|
1995 |
|
4 |
p. 16-18 3 p. |
artikel |
7 |
An overview of the products
|
Williams, Paul |
|
1990 |
|
4 |
p. 7-12 6 p. |
artikel |
8 |
Apathy to computer crime ‘astounding’
|
Rees, Frank |
|
1989 |
|
4 |
p. 4- 1 p. |
artikel |
9 |
A point to remember
|
|
|
1986 |
|
4 |
p. 2- 1 p. |
artikel |
10 |
A policy for a large multinational
|
Lacey, David |
|
1991 |
|
4 |
p. 13-18 6 p. |
artikel |
11 |
A reply to criticism
|
|
|
1986 |
|
4 |
p. 16- 1 p. |
artikel |
12 |
Are viruses underestimated?
|
|
|
1991 |
|
4 |
p. 3- 1 p. |
artikel |
13 |
Ashton-Tate helps introduce new copyright law in Spain
|
|
|
1988 |
|
4 |
p. 12-13 2 p. |
artikel |
14 |
Association of software protection
|
|
|
1983 |
|
4 |
p. 11- 1 p. |
artikel |
15 |
AT&T aligns with VLSI for cryptography chips
|
Zajac Jr., BernardP. |
|
1995 |
|
4 |
p. 6- 1 p. |
artikel |
16 |
Attitudes to fraud in banks
|
|
|
1980 |
|
4 |
p. 9-10 2 p. |
artikel |
17 |
Auditing - up to standard?
|
|
|
1981 |
|
4 |
p. 5-9 5 p. |
artikel |
18 |
Australia re-examines software copyright
|
|
|
1989 |
|
4 |
p. 3-4 2 p. |
artikel |
19 |
Author of aids disk arrested
|
Sterlicchi, John |
|
1990 |
|
4 |
p. 1-2 2 p. |
artikel |
20 |
Autodialler attacks American Honda
|
Menkus, Belden |
|
1992 |
|
4 |
p. 1-2 2 p. |
artikel |
21 |
BA accused of further hacking
|
|
|
1994 |
|
4 |
p. 4- 1 p. |
artikel |
22 |
Bank of England security guidelines
|
|
|
1985 |
|
4 |
p. 5-10 6 p. |
artikel |
23 |
Bell Atlantic to survey US security industry
|
|
|
1987 |
|
4 |
p. 13- 1 p. |
artikel |
24 |
Biometric identification systems update
|
Smith, Jack |
|
1993 |
|
4 |
p. 6-8 3 p. |
artikel |
25 |
Biometrics: the only positive identification
|
Wilding, Edward |
|
1989 |
|
4 |
p. 21-22 2 p. |
artikel |
26 |
British hackers hacked off
|
|
|
1985 |
|
4 |
p. 4-5 2 p. |
artikel |
27 |
Buy only from reliable sources
|
|
|
1989 |
|
4 |
p. 19-20 2 p. |
artikel |
28 |
‘Call forwarding’ used to steal competitors' business
|
Menkus, Belden |
|
1995 |
|
4 |
p. 3-4 2 p. |
artikel |
29 |
Canadian agency monitors phone and fax
|
|
|
1994 |
|
4 |
p. 2- 1 p. |
artikel |
30 |
Card watch reducing fraud
|
Smith, Jack |
|
1993 |
|
4 |
p. 2-3 2 p. |
artikel |
31 |
Case history of a virus attack
|
Highland, HaroldJ. |
|
1988 |
|
4 |
p. 4-7 4 p. |
artikel |
32 |
Case study
|
|
|
1979 |
|
4 |
p. 7-8 2 p. |
artikel |
33 |
CC:Mail users beware
|
Moeller, Mike |
|
1994 |
|
4 |
p. 6-7 2 p. |
artikel |
34 |
CIAC warns of serious NCSA WWW vulnerability
|
|
|
1995 |
|
4 |
p. 2-3 2 p. |
artikel |
35 |
Clinton approves Clipper, fails to relax export controls
|
Madsen, Wayne |
|
1994 |
|
4 |
p. 7-9 3 p. |
artikel |
36 |
Company code of conduct for computer systems
|
|
|
1984 |
|
4 |
p. 1-2 2 p. |
artikel |
37 |
Computer audit
|
|
|
1979 |
|
4 |
p. 2-5 4 p. |
artikel |
38 |
Computer crime 1986: An update of case history statistics
|
|
|
1987 |
|
4 |
p. 1-9 9 p. |
artikel |
39 |
Computer crime: Security techniques
|
|
|
1983 |
|
4 |
p. 1-9 9 p. |
artikel |
40 |
Computer fraud down under
|
|
|
1984 |
|
4 |
p. 3- 1 p. |
artikel |
41 |
Computerized personnel assessment
|
|
|
1980 |
|
4 |
p. 7- 1 p. |
artikel |
42 |
Computerized VAT fraud
|
|
|
1987 |
|
4 |
p. 10-11 2 p. |
artikel |
43 |
Computer law journal
|
|
|
1980 |
|
4 |
p. 2-4 3 p. |
artikel |
44 |
Computer security breaches affect half UK industry
|
|
|
1992 |
|
4 |
p. 6-9 4 p. |
artikel |
45 |
Computer security — comprehensive controls checklist
|
Watt, Steve |
|
1988 |
|
4 |
p. 15-16 2 p. |
artikel |
46 |
Computer security products
|
|
|
1990 |
|
4 |
p. 20- 1 p. |
artikel |
47 |
Computer security surveys
|
Collinson, Helen |
|
1995 |
|
4 |
p. 8-10 3 p. |
artikel |
48 |
Computers give inadmissible evidence
|
|
|
1980 |
|
4 |
p. 10-11 2 p. |
artikel |
49 |
Computers & Security journal
|
|
|
1990 |
|
4 |
p. 20- 1 p. |
artikel |
50 |
Conference file
|
|
|
1987 |
|
4 |
p. 15-16 2 p. |
artikel |
51 |
Control risks forms new computer security company
|
|
|
1989 |
|
4 |
p. 3- 1 p. |
artikel |
52 |
Copyright piracy trade war averted
|
|
|
1995 |
|
4 |
p. 4- 1 p. |
artikel |
53 |
Corporate Computer Security '90
|
|
|
1990 |
|
4 |
p. 6-7 2 p. |
artikel |
54 |
Counter spy shopping
|
|
|
1980 |
|
4 |
p. 6-7 2 p. |
artikel |
55 |
Database security and integrity
|
|
|
1982 |
|
4 |
p. 11-12 2 p. |
artikel |
56 |
Datatheft: Computer fraud, industrial espionage and information crime
|
Jackson, Keith |
|
1988 |
|
4 |
p. 14-15 2 p. |
artikel |
57 |
DEC appoints European security manager
|
|
|
1987 |
|
4 |
p. 11-12 2 p. |
artikel |
58 |
Definitions
|
|
|
1979 |
|
4 |
p. 9- 1 p. |
artikel |
59 |
Dutch security system breached
|
|
|
1980 |
|
4 |
p. 1-2 2 p. |
artikel |
60 |
Editorial afterword
|
|
|
1980 |
|
4 |
p. 12- 1 p. |
artikel |
61 |
Editorial Board
|
|
|
1991 |
|
4 |
p. 1- 1 p. |
artikel |
62 |
Editorial Board
|
|
|
1990 |
|
4 |
p. 1- 1 p. |
artikel |
63 |
EDP risk insurance matrix
|
|
|
1982 |
|
4 |
p. 1-8 8 p. |
artikel |
64 |
Electronic data interchange, open networks and business security
|
Draper, John |
|
1989 |
|
4 |
p. 4-12 9 p. |
artikel |
65 |
Electronic Piggybacking
|
Gregg, John |
|
1982 |
|
4 |
p. 8-10 3 p. |
artikel |
66 |
Electronic signature — the key to mobility
|
Nilson, Åke |
|
1993 |
|
4 |
p. 17-19 3 p. |
artikel |
67 |
Emergency services hacked
|
|
|
1990 |
|
4 |
p. 4-5 2 p. |
artikel |
68 |
Encryption Toolkit available on VAX/VMS
|
|
|
1987 |
|
4 |
p. 14-15 2 p. |
artikel |
69 |
European Security Forum growing rapidly
|
|
|
1990 |
|
4 |
p. 5- 1 p. |
artikel |
70 |
Events
|
|
|
1995 |
|
4 |
p. 20- 1 p. |
artikel |
71 |
Events
|
|
|
1994 |
|
4 |
p. 19-20 2 p. |
artikel |
72 |
Events
|
|
|
1992 |
|
4 |
p. 19- 1 p. |
artikel |
73 |
Events
|
|
|
1993 |
|
4 |
p. 19-20 2 p. |
artikel |
74 |
Events
|
|
|
1991 |
|
4 |
p. 19-20 2 p. |
artikel |
75 |
Events
|
|
|
1990 |
|
4 |
p. 18-19 2 p. |
artikel |
76 |
Faulty BASF tape cartridges
|
|
|
1992 |
|
4 |
p. 4-5 2 p. |
artikel |
77 |
Fight the smugglers to beat the pirates
|
|
|
1993 |
|
4 |
p. 5- 1 p. |
artikel |
78 |
Fire damage retrieval
|
|
|
1982 |
|
4 |
p. 10-11 2 p. |
artikel |
79 |
First UK hacker conviction upheld
|
|
|
1991 |
|
4 |
p. 4- 1 p. |
artikel |
80 |
Ford pays over the odds
|
|
|
1979 |
|
4 |
p. 5- 1 p. |
artikel |
81 |
Fraud Watch: A Guide for Business
|
Sommer, Peter |
|
1995 |
|
4 |
p. 18-19 2 p. |
artikel |
82 |
Government data network contract goes to sophos
|
|
|
1989 |
|
4 |
p. 3- 1 p. |
artikel |
83 |
Growing interest in anti-eavesdropping devices
|
|
|
1987 |
|
4 |
p. 9-10 2 p. |
artikel |
84 |
Hacker acquitted on ‘addiction’ defence
|
|
|
1993 |
|
4 |
p. 2- 1 p. |
artikel |
85 |
Hacker needed money for university education
|
|
|
1993 |
|
4 |
p. 5- 1 p. |
artikel |
86 |
Hackers clean driving licences for profit?
|
|
|
1986 |
|
4 |
p. 14- 1 p. |
artikel |
87 |
Hackers switch sides and become encryption developers
|
Moeller, Mike |
|
1993 |
|
4 |
p. 4-5 2 p. |
artikel |
88 |
Health insurance fraud claims settled
|
Menkus, Belden |
|
1993 |
|
4 |
p. 4- 1 p. |
artikel |
89 |
Hong Kong police shut down networks
|
|
|
1995 |
|
4 |
p. 4- 1 p. |
artikel |
90 |
Hot to spot a false purchase invoice
|
|
|
1979 |
|
4 |
p. 10-12 3 p. |
artikel |
91 |
How to protect ourselves from information
|
Ongetta, Silvano |
|
1995 |
|
4 |
p. 13-16 4 p. |
artikel |
92 |
How to protect your data
|
|
|
1986 |
|
4 |
p. 14-16 3 p. |
artikel |
93 |
Hunting the snark
|
Cripps, Benjamin |
|
1990 |
|
4 |
p. 12-16 5 p. |
artikel |
94 |
IBM VM CMS 4 open to a virus attack
|
|
|
1989 |
|
4 |
p. 20- 1 p. |
artikel |
95 |
ICL markets VME high security option
|
|
|
1988 |
|
4 |
p. 7-9 3 p. |
artikel |
96 |
Imitating bar codes
|
|
|
1985 |
|
4 |
p. 1-2 2 p. |
artikel |
97 |
Information security in financial services
|
Sommer, Peter |
|
1992 |
|
4 |
p. 20- 1 p. |
artikel |
98 |
Integrated test facility
|
|
|
1979 |
|
4 |
p. 6-7 2 p. |
artikel |
99 |
IRS faces increasing fraud
|
|
|
1994 |
|
4 |
p. 3- 1 p. |
artikel |
100 |
Italy and computer crimes (better late than never)
|
Ongetta, Silvano |
|
1994 |
|
4 |
p. 16-19 4 p. |
artikel |
101 |
Italy — Virus diffusion
|
Ongetta, Silvano |
|
1994 |
|
4 |
p. 3- 1 p. |
artikel |
102 |
Japan “haven for hackers”
|
|
|
1987 |
|
4 |
p. 11- 1 p. |
artikel |
103 |
KGB hackers receive sentencing
|
Gliss, Hans |
|
1990 |
|
4 |
p. 2-3 2 p. |
artikel |
104 |
Kids' stuff
|
|
|
1981 |
|
4 |
p. 9-10 2 p. |
artikel |
105 |
Legislation to protect chips
|
|
|
1989 |
|
4 |
p. 4- 1 p. |
artikel |
106 |
Lessons from disaster victims
|
Wong, Ken |
|
1994 |
|
4 |
p. 10-16 7 p. |
artikel |
107 |
Letters to the editor
|
|
|
1980 |
|
4 |
p. 7-9 3 p. |
artikel |
108 |
Logic bomber fined $5000
|
Menkus, Belden |
|
1992 |
|
4 |
p. 2- 1 p. |
artikel |
109 |
Low-cost protection against electromagnetic eavesdropping
|
|
|
1989 |
|
4 |
p. 1-2 2 p. |
artikel |
110 |
Management responsibilities
|
|
|
1980 |
|
4 |
p. 11-12 2 p. |
artikel |
111 |
Marconi awarded secure data contract
|
|
|
1988 |
|
4 |
p. 13- 1 p. |
artikel |
112 |
Marketplace
|
|
|
1995 |
|
4 |
p. 5- 1 p. |
artikel |
113 |
Marketplace
|
|
|
1993 |
|
4 |
p. 5-6 2 p. |
artikel |
114 |
Marketplace
|
|
|
1992 |
|
4 |
p. 5-6 2 p. |
artikel |
115 |
Marketplace
|
|
|
1991 |
|
4 |
p. 5- 1 p. |
artikel |
116 |
Marketplace
|
|
|
1994 |
|
4 |
p. 4-6 3 p. |
artikel |
117 |
Marketplace
|
|
|
1990 |
|
4 |
p. 5-6 2 p. |
artikel |
118 |
Master hacker indicted again
|
Sommer, Peter |
|
1990 |
|
4 |
p. 3-4 2 p. |
artikel |
119 |
Microsoft fights software piracy
|
|
|
1994 |
|
4 |
p. 1-2 2 p. |
artikel |
120 |
Mini-computer fraud
|
|
|
1981 |
|
4 |
p. 1-5 5 p. |
artikel |
121 |
Miscellaneous bank cases
|
|
|
1985 |
|
4 |
p. 4- 1 p. |
artikel |
122 |
Natas spreads in southwestern United States
|
|
|
1995 |
|
4 |
p. 4-5 2 p. |
artikel |
123 |
NBS and NSA set up risk management laboratory
|
|
|
1988 |
|
4 |
p. 13-14 2 p. |
artikel |
124 |
New data protection registration campaign
|
|
|
1994 |
|
4 |
p. 4- 1 p. |
artikel |
125 |
New French security software
|
|
|
1987 |
|
4 |
p. 12- 1 p. |
artikel |
126 |
New journal
|
|
|
1982 |
|
4 |
p. 12- 1 p. |
artikel |
127 |
New report from Jay Bloombecker
|
|
|
1986 |
|
4 |
p. 1-2 2 p. |
artikel |
128 |
New style computer parts thieves captured
|
Menkus, Belden |
|
1993 |
|
4 |
p. 3- 1 p. |
artikel |
129 |
NIST seeks views on cryptography
|
|
|
1991 |
|
4 |
p. 3-4 2 p. |
artikel |
130 |
Novell ships shrink-wrapped viruses
|
Sterlicchi, John |
|
1992 |
|
4 |
p. 2-4 3 p. |
artikel |
131 |
Online auditing using microcomputers
|
Joseph Highland,, Harold |
|
1989 |
|
4 |
p. 23-24 2 p. |
artikel |
132 |
Operation Sundevil under fire
|
Klopp, Charlotte |
|
1991 |
|
4 |
p. 1-2 2 p. |
artikel |
133 |
OS/400 upgrade bugs
|
|
|
1992 |
|
4 |
p. 5- 1 p. |
artikel |
134 |
PC used to steal ¥140 million
|
Menkus, Belden |
|
1995 |
|
4 |
p. 3- 1 p. |
artikel |
135 |
Policy implementation at W H Smith's
|
Hollins, Julie D. |
|
1992 |
|
4 |
p. 13-16 4 p. |
artikel |
136 |
Power users beware
|
Armstrong, Lisa |
|
1995 |
|
4 |
p. 7-8 2 p. |
artikel |
137 |
Product: Norton utilities, advanced edition
|
Jackson, Keith |
|
1989 |
|
4 |
p. 16-19 4 p. |
artikel |
138 |
Programming in prison
|
|
|
1983 |
|
4 |
p. 12- 1 p. |
artikel |
139 |
Recombinant virus protects network
|
|
|
1994 |
|
4 |
p. 2-3 2 p. |
artikel |
140 |
Recruiting trouble
|
|
|
1981 |
|
4 |
p. 11- 1 p. |
artikel |
141 |
Review of data privacy: 1992
|
Madsen, Wayne |
|
1993 |
|
4 |
p. 8-17 10 p. |
artikel |
142 |
Risk assessment for ‘con loss’ insurance
|
Sommer, Peter |
|
1989 |
|
4 |
p. 12-16 5 p. |
artikel |
143 |
Risk assessment seminar
|
|
|
1989 |
|
4 |
p. 24- 1 p. |
artikel |
144 |
Scicon to market safeword in UK
|
|
|
1988 |
|
4 |
p. 11-12 2 p. |
artikel |
145 |
Second European conference on computer audit, control and security
|
Paans, Ronald |
|
1988 |
|
4 |
p. 9-11 3 p. |
artikel |
146 |
Secret service made to pay $500 000 for unfair raid
|
Dunlap, Charlotte |
|
1993 |
|
4 |
p. 1-2 2 p. |
artikel |
147 |
Securing networks
|
Hughes, Tony |
|
1990 |
|
4 |
p. 16-18 3 p. |
artikel |
148 |
Security and the data protection act
|
|
|
1984 |
|
4 |
p. 3-12 10 p. |
artikel |
149 |
Sintrom launches data encryption system
|
|
|
1987 |
|
4 |
p. 12-13 2 p. |
artikel |
150 |
Slowly becoming standard
|
Snell, Monica |
|
1995 |
|
4 |
p. 6-7 2 p. |
artikel |
151 |
Software copyright law introduced in Argentina
|
|
|
1994 |
|
4 |
p. 1- 1 p. |
artikel |
152 |
Software protection conference
|
|
|
1981 |
|
4 |
p. 11-12 2 p. |
artikel |
153 |
Sophos launches public-key encryption system
|
|
|
1987 |
|
4 |
p. 13-14 2 p. |
artikel |
154 |
Spectacular computer crime
|
Mulhall, T. |
|
1991 |
|
4 |
p. 18-19 2 p. |
artikel |
155 |
Spy-proof glass deters eavesdropping
|
|
|
1991 |
|
4 |
p. 4-5 2 p. |
artikel |
156 |
Stop press
|
|
|
1995 |
|
4 |
p. 20- 1 p. |
artikel |
157 |
Stop press
|
Dunlap, Charlotte |
|
1993 |
|
4 |
p. 20- 1 p. |
artikel |
158 |
Stop press
|
|
|
1991 |
|
4 |
p. 20- 1 p. |
artikel |
159 |
Stop press
|
|
|
1994 |
|
4 |
p. 20- 1 p. |
artikel |
160 |
Stop press
|
|
|
1990 |
|
4 |
p. 20- 1 p. |
artikel |
161 |
‘1813’ strikes city university
|
Jackson, Keith |
|
1989 |
|
4 |
p. 19- 1 p. |
artikel |
162 |
Summary of the 1990 report
|
Charbon, F.H. |
|
1991 |
|
4 |
p. 6-13 8 p. |
artikel |
163 |
Sungard virus
|
Armstrong, Lisa |
|
1995 |
|
4 |
p. 7- 1 p. |
artikel |
164 |
Survey questionnaire
|
|
|
1979 |
|
4 |
p. 10- 1 p. |
artikel |
165 |
Systematic attacks
|
|
|
1981 |
|
4 |
p. 9- 1 p. |
artikel |
166 |
Taiwanese piracy sweep
|
|
|
1992 |
|
4 |
p. 5- 1 p. |
artikel |
167 |
Technical evaluation — PURGE
|
Jackson, Keith |
|
1988 |
|
4 |
p. 1-4 4 p. |
artikel |
168 |
The biggest bank fraud — how big is big?
|
|
|
1985 |
|
4 |
p. 2-3 2 p. |
artikel |
169 |
The complete computer virus handbook
|
Jackson, Keith |
|
1989 |
|
4 |
p. 22-23 2 p. |
artikel |
170 |
The crime that made the grade
|
|
|
1981 |
|
4 |
p. 10-11 2 p. |
artikel |
171 |
The Fed trials security smartcards
|
|
|
1991 |
|
4 |
p. 4- 1 p. |
artikel |
172 |
The hacker composite: a necessary security tool?
|
Dwan, Berni |
|
1995 |
|
4 |
p. 10-13 4 p. |
artikel |
173 |
The ‘in-word’
|
|
|
1985 |
|
4 |
p. 10-11 2 p. |
artikel |
174 |
The Nilson report
|
|
|
1980 |
|
4 |
p. 4-6 3 p. |
artikel |
175 |
The psychological subversion of information systems
|
Sherizen, Sanford |
|
1992 |
|
4 |
p. 17-18 2 p. |
artikel |
176 |
The 1st annual CoTRA conference
|
|
|
1990 |
|
4 |
p. 7- 1 p. |
artikel |
177 |
The tangled web; an extract
|
|
|
1986 |
|
4 |
p. 2-14 13 p. |
artikel |
178 |
Two new viruses pose threat
|
Highland, HaroldJoseph |
|
1989 |
|
4 |
p. 20-21 2 p. |
artikel |
179 |
Undetectable crime
|
|
|
1983 |
|
4 |
p. 9-11 3 p. |
artikel |
180 |
Undetected glitch leads to lost business
|
|
|
1992 |
|
4 |
p. 4- 1 p. |
artikel |
181 |
UNIRAS computer security made public
|
McCormack, Michael |
|
1995 |
|
4 |
p. 1-2 2 p. |
artikel |
182 |
US airlines charged with rigging computerized fare lists
|
Menkus, Belden |
|
1993 |
|
4 |
p. 5- 1 p. |
artikel |
183 |
US card issuers remain open to fraud
|
Menkus, Belden |
|
1992 |
|
4 |
p. 4- 1 p. |
artikel |
184 |
US DoD to test new e-mail security products
|
Steffora, Anne |
|
1994 |
|
4 |
p. 7- 1 p. |
artikel |
185 |
Users unaware of distributed information vulnerability
|
Dunlap, Charlotte |
|
1993 |
|
4 |
p. 3-4 2 p. |
artikel |
186 |
US most wanted hacker arrested
|
Zajac Jr., BernardP. |
|
1995 |
|
4 |
p. 3- 1 p. |
artikel |
187 |
US Treasury requires federal EFT authentication
|
|
|
1987 |
|
4 |
p. 15- 1 p. |
artikel |
188 |
Virus insurance from Lloyds of London
|
|
|
1989 |
|
4 |
p. 2-3 2 p. |
artikel |
189 |
Visa credit checks go wireless
|
|
|
1991 |
|
4 |
p. 2- 1 p. |
artikel |
190 |
Warning message against security risks
|
|
|
1994 |
|
4 |
p. 2- 1 p. |
artikel |
191 |
Xephon user survey
|
|
|
1985 |
|
4 |
p. 11-12 2 p. |
artikel |