nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blow for free parking
|
|
|
1980 |
|
7 |
p. 8- 1 p. |
artikel |
2 |
Access control packages
|
|
|
1983 |
|
7 |
p. 1-2 2 p. |
artikel |
3 |
ACLU fronts US direct marketing interests — hosts meeting for European data protection commissioners
|
Madsen, Wayne |
|
1994 |
|
7 |
p. 6-7 2 p. |
artikel |
4 |
Ada language poses threat to security
|
|
|
1991 |
|
7 |
p. 1-2 2 p. |
artikel |
5 |
A deliberate mistake?
|
|
|
1981 |
|
7 |
p. 8-9 2 p. |
artikel |
6 |
A difficult and unpleasant task
|
|
|
1983 |
|
7 |
p. 4-8 5 p. |
artikel |
7 |
A$1.4 million computer fraud
|
Lawrence, Les |
|
1995 |
|
7 |
p. 5-7 3 p. |
artikel |
8 |
Anti-virus products
|
|
|
1989 |
|
7 |
p. 3-4 2 p. |
artikel |
9 |
Asit '89
|
|
|
1989 |
|
7 |
p. 18- 1 p. |
artikel |
10 |
Attack on US privacy continues unabated
|
Madsen, Wayne |
|
1991 |
|
7 |
p. 4-5 2 p. |
artikel |
11 |
AT&T provides cautious anti-hacking service
|
Moeller, Mike |
|
1992 |
|
7 |
p. 1-2 2 p. |
artikel |
12 |
Australia's EFT security under scrutiny
|
Rees, Frank |
|
1991 |
|
7 |
p. 2-3 2 p. |
artikel |
13 |
Automated risk assessment
|
|
|
1981 |
|
7 |
p. 1-8 8 p. |
artikel |
14 |
Ban hacking in the UK
|
|
|
1989 |
|
7 |
p. 4- 1 p. |
artikel |
15 |
Banker's trust encourages key-escrow
|
English, Erin |
|
1995 |
|
7 |
p. 7-8 2 p. |
artikel |
16 |
Beating betas
|
|
|
1989 |
|
7 |
p. 4- 1 p. |
artikel |
17 |
Beating the hackers - US report discusses protection techniques
|
|
|
1987 |
|
7 |
p. 13-14 2 p. |
artikel |
18 |
Big bang in computer fraud?
|
Wagland, Jeff |
|
1986 |
|
7 |
p. 1-3 3 p. |
artikel |
19 |
Bits on hacking
|
|
|
1985 |
|
7 |
p. 1-2 2 p. |
artikel |
20 |
Black Baron convicted
|
|
|
1995 |
|
7 |
p. 3- 1 p. |
artikel |
21 |
Bolero — a practical application of trusted third party services
|
King, Judith |
|
1995 |
|
7 |
p. 12-15 4 p. |
artikel |
22 |
Book review: Cipher systems
|
|
|
1983 |
|
7 |
p. 10-11 2 p. |
artikel |
23 |
Book review: security of minicomputers
|
|
|
1983 |
|
7 |
p. 8-10 3 p. |
artikel |
24 |
‘Brain’ — the truth is revealed
|
Hruska, Jan |
|
1988 |
|
7 |
p. 2-3 2 p. |
artikel |
25 |
BSA sweeps Benelux region
|
|
|
1992 |
|
7 |
p. 3- 1 p. |
artikel |
26 |
Built-in security
|
Gliss, Hans |
|
1989 |
|
7 |
p. 16-17 2 p. |
artikel |
27 |
Business recovery planning — The Oracle approach
|
Johnson, Mark |
|
1994 |
|
7 |
p. 8-13 6 p. |
artikel |
28 |
Case study
|
|
|
1979 |
|
7 |
p. 9-10 2 p. |
artikel |
29 |
Case study — the role of computer audit at Price Waterhouse
|
Beale, Ian |
|
1988 |
|
7 |
p. 10-13 4 p. |
artikel |
30 |
Chasing the fraudsters
|
|
|
1990 |
|
7 |
p. 3-4 2 p. |
artikel |
31 |
Commonsense computer security
|
Wilding, Edward |
|
1990 |
|
7 |
p. 17-18 2 p. |
artikel |
32 |
Communications — Security vulnerabilities
|
|
|
1984 |
|
7 |
p. 8-10 3 p. |
artikel |
33 |
Compacs '89
|
|
|
1989 |
|
7 |
p. 5- 1 p. |
artikel |
34 |
Computer brinkmanship
|
|
|
1990 |
|
7 |
p. 4-5 2 p. |
artikel |
35 |
Computer crime in Australia — is the law enough?
|
Lawrence, Les |
|
1988 |
|
7 |
p. 6-7 2 p. |
artikel |
36 |
Computer crime seminar
|
|
|
1983 |
|
7 |
p. 11-12 2 p. |
artikel |
37 |
Computer Freud
|
|
|
1986 |
|
7 |
p. 5-6 2 p. |
artikel |
38 |
Computer mating?
|
|
|
1980 |
|
7 |
p. 9- 1 p. |
artikel |
39 |
Computer security risk management
|
Watts, Steve |
|
1990 |
|
7 |
p. 17- 1 p. |
artikel |
40 |
Computers go up in smoke
|
|
|
1980 |
|
7 |
p. 8- 1 p. |
artikel |
41 |
Computer smuggling
|
|
|
1980 |
|
7 |
p. 9- 1 p. |
artikel |
42 |
Computers & security journal
|
|
|
1989 |
|
7 |
p. 19- 1 p. |
artikel |
43 |
Computer villain cries when caught
|
|
|
1979 |
|
7 |
p. 11- 1 p. |
artikel |
44 |
Convicts training scheme stopped
|
|
|
1983 |
|
7 |
p. 10- 1 p. |
artikel |
45 |
Copyright and computer programs in Holland
|
|
|
1986 |
|
7 |
p. 3-4 2 p. |
artikel |
46 |
Corporate attitudes to computer mis-use; A case study
|
|
|
1982 |
|
7 |
p. 1-28 28 p. |
artikel |
47 |
Cracking PC security
|
Lawrence, Les |
|
1988 |
|
7 |
p. 4-6 3 p. |
artikel |
48 |
Credit card losses finally decline
|
|
|
1994 |
|
7 |
p. 2- 1 p. |
artikel |
49 |
Credit card security boosted by nuclear weapons program
|
Bucholtz, Chris |
|
1995 |
|
7 |
p. 9- 1 p. |
artikel |
50 |
Data Encryption Standard to be reviewed
|
|
|
1987 |
|
7 |
p. 14- 1 p. |
artikel |
51 |
Datapro seminars
|
|
|
1989 |
|
7 |
p. 19- 1 p. |
artikel |
52 |
Dealer uses phony data to defraud GMAC
|
Menkus, Belden |
|
1992 |
|
7 |
p. 5- 1 p. |
artikel |
53 |
Definitions
|
|
|
1979 |
|
7 |
p. 11-12 2 p. |
artikel |
54 |
Disaster recovery drill goes wrong
|
Menkus, Belden |
|
1992 |
|
7 |
p. 3- 1 p. |
artikel |
55 |
Disaster recovery today
|
Farquhar, Bill |
|
1993 |
|
7 |
p. 14-16 3 p. |
artikel |
56 |
Do-it-yourself desktop forgery
|
|
|
1990 |
|
7 |
p. 2-3 2 p. |
artikel |
57 |
Doubts expressed on Central Point anti-virus claim
|
|
|
1993 |
|
7 |
p. 4- 1 p. |
artikel |
58 |
Editorial: commercial fraud and computers
|
|
|
1980 |
|
7 |
p. 1-2 2 p. |
artikel |
59 |
EFTPOS security
|
|
|
1989 |
|
7 |
p. 4- 1 p. |
artikel |
60 |
Enigma variations
|
|
|
1989 |
|
7 |
p. 18-19 2 p. |
artikel |
61 |
European Community funds more computer security
|
|
|
1992 |
|
7 |
p. 2- 1 p. |
artikel |
62 |
Events
|
|
|
1991 |
|
7 |
p. 19- 1 p. |
artikel |
63 |
Events
|
|
|
1992 |
|
7 |
p. 18-19 2 p. |
artikel |
64 |
Events
|
|
|
1993 |
|
7 |
p. 20- 1 p. |
artikel |
65 |
Events
|
|
|
1994 |
|
7 |
p. 19-20 2 p. |
artikel |
66 |
Events
|
|
|
1995 |
|
7 |
p. 19-20 2 p. |
artikel |
67 |
Events
|
|
|
1990 |
|
7 |
p. 18-19 2 p. |
artikel |
68 |
Experts to tackle computer security
|
Rees, Frank |
|
1994 |
|
7 |
p. 4-5 2 p. |
artikel |
69 |
Fall in multibillion dollar piracy problem
|
|
|
1993 |
|
7 |
p. 1-2 2 p. |
artikel |
70 |
Fast lobbies MPs to fight piracy
|
|
|
1994 |
|
7 |
p. 1-2 2 p. |
artikel |
71 |
Fault tolerance in Local Area Networks
|
Dance, StephenG. |
|
1988 |
|
7 |
p. 13-16 4 p. |
artikel |
72 |
File security exposures in practice
|
|
|
1983 |
|
7 |
p. 2-4 3 p. |
artikel |
73 |
$40 000 fine for software piracy
|
|
|
1994 |
|
7 |
p. 2- 1 p. |
artikel |
74 |
Fire destroys Philadelphia high-rise
|
Menkus, Belden |
|
1991 |
|
7 |
p. 5- 1 p. |
artikel |
75 |
Fire protection for electronic DP installations: BS code of practice
|
|
|
1984 |
|
7 |
p. 11-12 2 p. |
artikel |
76 |
First hacking tria.l in the UK
|
|
|
1986 |
|
7 |
p. 4- 1 p. |
artikel |
77 |
Fortress - the debate continues
|
High, John |
|
1987 |
|
7 |
p. 10-11 2 p. |
artikel |
78 |
Fraud in the city doubles to £1 billion
|
|
|
1992 |
|
7 |
p. 4-5 2 p. |
artikel |
79 |
French roundup
|
Hill, Philip |
|
1989 |
|
7 |
p. 2-3 2 p. |
artikel |
80 |
Geisco, Racal sign financial systems security deal
|
|
|
1987 |
|
7 |
p. 1-3 3 p. |
artikel |
81 |
German spy ring
|
|
|
1989 |
|
7 |
p. 4- 1 p. |
artikel |
82 |
Government v. private encryption
|
|
|
1986 |
|
7 |
p. 6-7 2 p. |
artikel |
83 |
Hacker ringleader convicted
|
|
|
1990 |
|
7 |
p. 3- 1 p. |
artikel |
84 |
Hackers exploit weakness in anti-abuse software
|
|
|
1995 |
|
7 |
p. 1-2 2 p. |
artikel |
85 |
HIV records—confidentiality breached
|
|
|
1994 |
|
7 |
p. 3-4 2 p. |
artikel |
86 |
Hoechst faces privacy questions
|
|
|
1992 |
|
7 |
p. 3-4 2 p. |
artikel |
87 |
House of Lords clears Prestel hackers
|
|
|
1988 |
|
7 |
p. 1-2 2 p. |
artikel |
88 |
How to implement an end-to-end security framework
|
Wong, Ken |
|
1993 |
|
7 |
p. 11-13 3 p. |
artikel |
89 |
IBC conferences
|
|
|
1989 |
|
7 |
p. 19- 1 p. |
artikel |
90 |
IBM VM virus alert
|
Highland, HaroldJoseph |
|
1989 |
|
7 |
p. 8- 1 p. |
artikel |
91 |
Inaugural meeting
|
|
|
1989 |
|
7 |
p. 6-7 2 p. |
artikel |
92 |
Insurance and contingency planning: Making the mix
|
Sommer, Peter |
|
1993 |
|
7 |
p. 5-11 7 p. |
artikel |
93 |
Integrated test facility (ITF)
|
Parker, Donn B. |
|
1979 |
|
7 |
p. 1-3 3 p. |
artikel |
94 |
Internal Audit and computer systems
|
|
|
1979 |
|
7 |
p. 4-7 4 p. |
artikel |
95 |
Is silence golden?
|
|
|
1980 |
|
7 |
p. 7- 1 p. |
artikel |
96 |
Italy plagued by viruses
|
|
|
1993 |
|
7 |
p. 4- 1 p. |
artikel |
97 |
Junkie—extremely difficult to detect
|
|
|
1994 |
|
7 |
p. 3- 1 p. |
artikel |
98 |
Lessons in litigation
|
Larner, Steve |
|
1991 |
|
7 |
p. 16-19 4 p. |
artikel |
99 |
Literature
|
|
|
1979 |
|
7 |
p. 12-16 5 p. |
artikel |
100 |
Lock up your data — New system
|
|
|
1984 |
|
7 |
p. 1-8 8 p. |
artikel |
101 |
Marketplace
|
|
|
1995 |
|
7 |
p. 5- 1 p. |
artikel |
102 |
Marketplace
|
|
|
1991 |
|
7 |
p. 5-6 2 p. |
artikel |
103 |
Marketplace
|
|
|
1992 |
|
7 |
p. 5-6 2 p. |
artikel |
104 |
Marketplace
|
|
|
1994 |
|
7 |
p. 5- 1 p. |
artikel |
105 |
Marketplace
|
|
|
1990 |
|
7 |
p. 6- 1 p. |
artikel |
106 |
Morris escapes jail
|
Sterlicchi, John |
|
1990 |
|
7 |
p. 1-2 2 p. |
artikel |
107 |
Motives underlying acts of computer abuse
|
Horwitz, G. |
|
1979 |
|
7 |
p. 7-8 2 p. |
artikel |
108 |
NCR customers sue over safety
|
Menkus, Belden |
|
1991 |
|
7 |
p. 3- 1 p. |
artikel |
109 |
Need for worldwide internet laws
|
|
|
1995 |
|
7 |
p. 10- 1 p. |
artikel |
110 |
New products
|
|
|
1991 |
|
7 |
p. 20- 1 p. |
artikel |
111 |
New security service
|
|
|
1986 |
|
7 |
p. 6- 1 p. |
artikel |
112 |
New spy-proof screen
|
|
|
1994 |
|
7 |
p. 3- 1 p. |
artikel |
113 |
No brut force
|
|
|
1980 |
|
7 |
p. 2-7 6 p. |
artikel |
114 |
North sea fraud: A story of a bored driller
|
|
|
1979 |
|
7 |
p. 11- 1 p. |
artikel |
115 |
Noted attorney to defend Poulsen
|
Klopp, Charlotte |
|
1991 |
|
7 |
p. 2- 1 p. |
artikel |
116 |
NT$50 million ATM fraud
|
|
|
1993 |
|
7 |
p. 3- 1 p. |
artikel |
117 |
OAD, CRANK and CLODO on the warpath
|
|
|
1980 |
|
7 |
p. 10-12 3 p. |
artikel |
118 |
One person's litter is another's scam
|
|
|
1994 |
|
7 |
p. 3- 1 p. |
artikel |
119 |
Other problems in Dublin
|
|
|
1980 |
|
7 |
p. 7- 1 p. |
artikel |
120 |
Password control
|
Lawrence, L.G. |
|
1993 |
|
7 |
p. 16-19 4 p. |
artikel |
121 |
Phrackers attack Canadian paper
|
|
|
1991 |
|
7 |
p. 3-4 2 p. |
artikel |
122 |
Piracy declines in USA
|
|
|
1995 |
|
7 |
p. 4- 1 p. |
artikel |
123 |
Police crack down on hacking
|
|
|
1995 |
|
7 |
p. 2-3 2 p. |
artikel |
124 |
Potential Netware security problem
|
|
|
1993 |
|
7 |
p. 5- 1 p. |
artikel |
125 |
Promis monitoring bank transactions
|
Madsen, Wayne |
|
1995 |
|
7 |
p. 7- 1 p. |
artikel |
126 |
Protecting your trading partners
|
Sherwood, John |
|
1990 |
|
7 |
p. 7-10 4 p. |
artikel |
127 |
Publications
|
|
|
1990 |
|
7 |
p. 20- 1 p. |
artikel |
128 |
Pupils cautioned for card fraud
|
|
|
1995 |
|
7 |
p. 3- 1 p. |
artikel |
129 |
Rambo the virus?
|
|
|
1990 |
|
7 |
p. 4- 1 p. |
artikel |
130 |
Reality failure
|
|
|
1990 |
|
7 |
p. 5-6 2 p. |
artikel |
131 |
Report predicts increased market for data protection
|
|
|
1985 |
|
7 |
p. 3-4 2 p. |
artikel |
132 |
Retail Virus Control Centre
|
|
|
1989 |
|
7 |
p. 4- 1 p. |
artikel |
133 |
Risk assessment
|
|
|
1989 |
|
7 |
p. 5- 1 p. |
artikel |
134 |
Risk vs reward in computer crime
|
|
|
1980 |
|
7 |
p. 9-10 2 p. |
artikel |
135 |
Row puts internet provision in doubt
|
|
|
1995 |
|
7 |
p. 4- 1 p. |
artikel |
136 |
School plagued by hackers
|
|
|
1994 |
|
7 |
p. 2-3 2 p. |
artikel |
137 |
Security aspects in it systems based on mobile micro computers
|
Gliss, Hans |
|
1994 |
|
7 |
p. 13-19 7 p. |
artikel |
138 |
Security: User requirements, workstations, and auditability
|
Bhaskar, Krish |
|
1987 |
|
7 |
p. 3-9 7 p. |
artikel |
139 |
Security with optical fibre
|
Harrad, Jane |
|
1990 |
|
7 |
p. 14-16 3 p. |
artikel |
140 |
Shop worker proves store's lack of security
|
|
|
1995 |
|
7 |
p. 3- 1 p. |
artikel |
141 |
Situations vacant
|
|
|
1985 |
|
7 |
p. 2-3 2 p. |
artikel |
142 |
Software glitch disrupts intercontinental air traffic
|
Menkus, Belden |
|
1992 |
|
7 |
p. 3- 1 p. |
artikel |
143 |
Some expert advice
|
|
|
1981 |
|
7 |
p. 15-16 2 p. |
artikel |
144 |
Some practical advice
|
|
|
1992 |
|
7 |
p. 6-12 7 p. |
artikel |
145 |
Sophos workshops
|
|
|
1989 |
|
7 |
p. 19- 1 p. |
artikel |
146 |
Springtime virus specials
|
|
|
1992 |
|
7 |
p. 4- 1 p. |
artikel |
147 |
Stamping out fraud
|
Moffat, J.K. |
|
1989 |
|
7 |
p. 8-9 2 p. |
artikel |
148 |
Stop press
|
|
|
1991 |
|
7 |
p. 20- 1 p. |
artikel |
149 |
Stop press
|
|
|
1993 |
|
7 |
p. 20- 1 p. |
artikel |
150 |
Stop press
|
|
|
1994 |
|
7 |
p. 20- 1 p. |
artikel |
151 |
Stop press
|
|
|
1995 |
|
7 |
p. 20- 1 p. |
artikel |
152 |
Stop press
|
|
|
1990 |
|
7 |
p. 20- 1 p. |
artikel |
153 |
Stop press
|
|
|
1989 |
|
7 |
p. 20- 1 p. |
artikel |
154 |
Strikes
|
|
|
1979 |
|
7 |
p. 8-9 2 p. |
artikel |
155 |
Sundry frauds
|
|
|
1979 |
|
7 |
p. 10- 1 p. |
artikel |
156 |
Technical review — Watchword
|
Jackson, Keith |
|
1988 |
|
7 |
p. 8-10 3 p. |
artikel |
157 |
Teenage hackers attack credit files
|
Menkus, Belden |
|
1992 |
|
7 |
p. 2- 1 p. |
artikel |
158 |
Terminal with built-in cryptography
|
|
|
1981 |
|
7 |
p. 13-15 3 p. |
artikel |
159 |
The computer virus crisis
|
|
|
1989 |
|
7 |
p. 17-18 2 p. |
artikel |
160 |
The cost of privacy protection
|
|
|
1981 |
|
7 |
p. 10-13 4 p. |
artikel |
161 |
The final days of reusable passwords
|
Riggs, Brian |
|
1994 |
|
7 |
p. 7- 1 p. |
artikel |
162 |
The good companions
|
Tantam, Mark |
|
1989 |
|
7 |
p. 10-13 4 p. |
artikel |
163 |
The 1989 International Computer Law Symposium
|
|
|
1989 |
|
7 |
p. 5-6 2 p. |
artikel |
164 |
The international handbook on computer crime
|
Kelman, Alistair |
|
1987 |
|
7 |
p. 14-16 3 p. |
artikel |
165 |
The Italian virus
|
|
|
1989 |
|
7 |
p. 7-8 2 p. |
artikel |
166 |
The limits of the law
|
Sommer, Peter |
|
1991 |
|
7 |
p. 6-16 11 p. |
artikel |
167 |
The mother of all safeguards
|
|
|
1995 |
|
7 |
p. 10-12 3 p. |
artikel |
168 |
The move to structured cabling
|
Gahan, Chris |
|
1990 |
|
7 |
p. 10-14 5 p. |
artikel |
169 |
The security phase of software development
|
Robertson, Bernard |
|
1992 |
|
7 |
p. 12-17 6 p. |
artikel |
170 |
The very newest audit technique
|
|
|
1979 |
|
7 |
p. 3-4 2 p. |
artikel |
171 |
Title: Computer-related risks
|
Sommer, Peter |
|
1995 |
|
7 |
p. 18-19 2 p. |
artikel |
172 |
Training centre settles out of court
|
|
|
1995 |
|
7 |
p. 4- 1 p. |
artikel |
173 |
Trusted systems readings
|
|
|
1989 |
|
7 |
p. 19-20 2 p. |
artikel |
174 |
Two US companies take steps to prevent hacking
|
|
|
1993 |
|
7 |
p. 4- 1 p. |
artikel |
175 |
Understanding the minds behind the viruses
|
Goodwins, Rupert |
|
1988 |
|
7 |
p. 3-4 2 p. |
artikel |
176 |
Unix secret at GCHQ
|
|
|
1989 |
|
7 |
p. 2- 1 p. |
artikel |
177 |
Up-to-the-minute network security
|
Riggs, Brian |
|
1994 |
|
7 |
p. 8- 1 p. |
artikel |
178 |
US computer security market approaches $3 billion
|
|
|
1987 |
|
7 |
p. 12-13 2 p. |
artikel |
179 |
US congress reviews computer fraud evidence
|
|
|
1986 |
|
7 |
p. 4-5 2 p. |
artikel |
180 |
US government and computer software
|
|
|
1986 |
|
7 |
p. 7-12 6 p. |
artikel |
181 |
US may dismantle civilian computer security structure
|
Madsen, Wayne |
|
1995 |
|
7 |
p. 8- 1 p. |
artikel |
182 |
US semiconductor chip protection act
|
Greguras, Fred M |
|
1985 |
|
7 |
p. 4-12 9 p. |
artikel |
183 |
US software firms cry foul to Government encyption laws
|
Dunlap, Charlotte |
|
1993 |
|
7 |
p. 2-3 2 p. |
artikel |
184 |
US used reseller is duped
|
Menkus, Belden |
|
1991 |
|
7 |
p. 5- 1 p. |
artikel |
185 |
Vaccine
|
Jackson, Keith |
|
1989 |
|
7 |
p. 13-16 4 p. |
artikel |
186 |
Video review
|
|
|
1992 |
|
7 |
p. 17-18 2 p. |
artikel |
187 |
Viewpoint
|
Les Lawrence, |
|
1992 |
|
7 |
p. 19-20 2 p. |
artikel |
188 |
Viruses creep into Japan
|
|
|
1992 |
|
7 |
p. 2-3 2 p. |
artikel |
189 |
What is a privacy infringement?
|
|
|
1979 |
|
7 |
p. 9- 1 p. |
artikel |
190 |
When does a perk become a crime?
|
|
|
1981 |
|
7 |
p. 9-10 2 p. |
artikel |
191 |
Why the cuckoo's egg might never have been written!
|
Dwan, Berni |
|
1995 |
|
7 |
p. 15-18 4 p. |
artikel |