Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             191 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blow for free parking 1980
7 p. 8-
1 p.
artikel
2 Access control packages 1983
7 p. 1-2
2 p.
artikel
3 ACLU fronts US direct marketing interests — hosts meeting for European data protection commissioners Madsen, Wayne
1994
7 p. 6-7
2 p.
artikel
4 Ada language poses threat to security 1991
7 p. 1-2
2 p.
artikel
5 A deliberate mistake? 1981
7 p. 8-9
2 p.
artikel
6 A difficult and unpleasant task 1983
7 p. 4-8
5 p.
artikel
7 A$1.4 million computer fraud Lawrence, Les
1995
7 p. 5-7
3 p.
artikel
8 Anti-virus products 1989
7 p. 3-4
2 p.
artikel
9 Asit '89 1989
7 p. 18-
1 p.
artikel
10 Attack on US privacy continues unabated Madsen, Wayne
1991
7 p. 4-5
2 p.
artikel
11 AT&T provides cautious anti-hacking service Moeller, Mike
1992
7 p. 1-2
2 p.
artikel
12 Australia's EFT security under scrutiny Rees, Frank
1991
7 p. 2-3
2 p.
artikel
13 Automated risk assessment 1981
7 p. 1-8
8 p.
artikel
14 Ban hacking in the UK 1989
7 p. 4-
1 p.
artikel
15 Banker's trust encourages key-escrow English, Erin
1995
7 p. 7-8
2 p.
artikel
16 Beating betas 1989
7 p. 4-
1 p.
artikel
17 Beating the hackers - US report discusses protection techniques 1987
7 p. 13-14
2 p.
artikel
18 Big bang in computer fraud? Wagland, Jeff
1986
7 p. 1-3
3 p.
artikel
19 Bits on hacking 1985
7 p. 1-2
2 p.
artikel
20 Black Baron convicted 1995
7 p. 3-
1 p.
artikel
21 Bolero — a practical application of trusted third party services King, Judith
1995
7 p. 12-15
4 p.
artikel
22 Book review: Cipher systems 1983
7 p. 10-11
2 p.
artikel
23 Book review: security of minicomputers 1983
7 p. 8-10
3 p.
artikel
24 ‘Brain’ — the truth is revealed Hruska, Jan
1988
7 p. 2-3
2 p.
artikel
25 BSA sweeps Benelux region 1992
7 p. 3-
1 p.
artikel
26 Built-in security Gliss, Hans
1989
7 p. 16-17
2 p.
artikel
27 Business recovery planning — The Oracle approach Johnson, Mark
1994
7 p. 8-13
6 p.
artikel
28 Case study 1979
7 p. 9-10
2 p.
artikel
29 Case study — the role of computer audit at Price Waterhouse Beale, Ian
1988
7 p. 10-13
4 p.
artikel
30 Chasing the fraudsters 1990
7 p. 3-4
2 p.
artikel
31 Commonsense computer security Wilding, Edward
1990
7 p. 17-18
2 p.
artikel
32 Communications — Security vulnerabilities 1984
7 p. 8-10
3 p.
artikel
33 Compacs '89 1989
7 p. 5-
1 p.
artikel
34 Computer brinkmanship 1990
7 p. 4-5
2 p.
artikel
35 Computer crime in Australia — is the law enough? Lawrence, Les
1988
7 p. 6-7
2 p.
artikel
36 Computer crime seminar 1983
7 p. 11-12
2 p.
artikel
37 Computer Freud 1986
7 p. 5-6
2 p.
artikel
38 Computer mating? 1980
7 p. 9-
1 p.
artikel
39 Computer security risk management Watts, Steve
1990
7 p. 17-
1 p.
artikel
40 Computers go up in smoke 1980
7 p. 8-
1 p.
artikel
41 Computer smuggling 1980
7 p. 9-
1 p.
artikel
42 Computers & security journal 1989
7 p. 19-
1 p.
artikel
43 Computer villain cries when caught 1979
7 p. 11-
1 p.
artikel
44 Convicts training scheme stopped 1983
7 p. 10-
1 p.
artikel
45 Copyright and computer programs in Holland 1986
7 p. 3-4
2 p.
artikel
46 Corporate attitudes to computer mis-use; A case study 1982
7 p. 1-28
28 p.
artikel
47 Cracking PC security Lawrence, Les
1988
7 p. 4-6
3 p.
artikel
48 Credit card losses finally decline 1994
7 p. 2-
1 p.
artikel
49 Credit card security boosted by nuclear weapons program Bucholtz, Chris
1995
7 p. 9-
1 p.
artikel
50 Data Encryption Standard to be reviewed 1987
7 p. 14-
1 p.
artikel
51 Datapro seminars 1989
7 p. 19-
1 p.
artikel
52 Dealer uses phony data to defraud GMAC Menkus, Belden
1992
7 p. 5-
1 p.
artikel
53 Definitions 1979
7 p. 11-12
2 p.
artikel
54 Disaster recovery drill goes wrong Menkus, Belden
1992
7 p. 3-
1 p.
artikel
55 Disaster recovery today Farquhar, Bill
1993
7 p. 14-16
3 p.
artikel
56 Do-it-yourself desktop forgery 1990
7 p. 2-3
2 p.
artikel
57 Doubts expressed on Central Point anti-virus claim 1993
7 p. 4-
1 p.
artikel
58 Editorial: commercial fraud and computers 1980
7 p. 1-2
2 p.
artikel
59 EFTPOS security 1989
7 p. 4-
1 p.
artikel
60 Enigma variations 1989
7 p. 18-19
2 p.
artikel
61 European Community funds more computer security 1992
7 p. 2-
1 p.
artikel
62 Events 1991
7 p. 19-
1 p.
artikel
63 Events 1992
7 p. 18-19
2 p.
artikel
64 Events 1993
7 p. 20-
1 p.
artikel
65 Events 1994
7 p. 19-20
2 p.
artikel
66 Events 1995
7 p. 19-20
2 p.
artikel
67 Events 1990
7 p. 18-19
2 p.
artikel
68 Experts to tackle computer security Rees, Frank
1994
7 p. 4-5
2 p.
artikel
69 Fall in multibillion dollar piracy problem 1993
7 p. 1-2
2 p.
artikel
70 Fast lobbies MPs to fight piracy 1994
7 p. 1-2
2 p.
artikel
71 Fault tolerance in Local Area Networks Dance, StephenG.
1988
7 p. 13-16
4 p.
artikel
72 File security exposures in practice 1983
7 p. 2-4
3 p.
artikel
73 $40 000 fine for software piracy 1994
7 p. 2-
1 p.
artikel
74 Fire destroys Philadelphia high-rise Menkus, Belden
1991
7 p. 5-
1 p.
artikel
75 Fire protection for electronic DP installations: BS code of practice 1984
7 p. 11-12
2 p.
artikel
76 First hacking tria.l in the UK 1986
7 p. 4-
1 p.
artikel
77 Fortress - the debate continues High, John
1987
7 p. 10-11
2 p.
artikel
78 Fraud in the city doubles to £1 billion 1992
7 p. 4-5
2 p.
artikel
79 French roundup Hill, Philip
1989
7 p. 2-3
2 p.
artikel
80 Geisco, Racal sign financial systems security deal 1987
7 p. 1-3
3 p.
artikel
81 German spy ring 1989
7 p. 4-
1 p.
artikel
82 Government v. private encryption 1986
7 p. 6-7
2 p.
artikel
83 Hacker ringleader convicted 1990
7 p. 3-
1 p.
artikel
84 Hackers exploit weakness in anti-abuse software 1995
7 p. 1-2
2 p.
artikel
85 HIV records—confidentiality breached 1994
7 p. 3-4
2 p.
artikel
86 Hoechst faces privacy questions 1992
7 p. 3-4
2 p.
artikel
87 House of Lords clears Prestel hackers 1988
7 p. 1-2
2 p.
artikel
88 How to implement an end-to-end security framework Wong, Ken
1993
7 p. 11-13
3 p.
artikel
89 IBC conferences 1989
7 p. 19-
1 p.
artikel
90 IBM VM virus alert Highland, HaroldJoseph
1989
7 p. 8-
1 p.
artikel
91 Inaugural meeting 1989
7 p. 6-7
2 p.
artikel
92 Insurance and contingency planning: Making the mix Sommer, Peter
1993
7 p. 5-11
7 p.
artikel
93 Integrated test facility (ITF) Parker, Donn B.
1979
7 p. 1-3
3 p.
artikel
94 Internal Audit and computer systems 1979
7 p. 4-7
4 p.
artikel
95 Is silence golden? 1980
7 p. 7-
1 p.
artikel
96 Italy plagued by viruses 1993
7 p. 4-
1 p.
artikel
97 Junkie—extremely difficult to detect 1994
7 p. 3-
1 p.
artikel
98 Lessons in litigation Larner, Steve
1991
7 p. 16-19
4 p.
artikel
99 Literature 1979
7 p. 12-16
5 p.
artikel
100 Lock up your data — New system 1984
7 p. 1-8
8 p.
artikel
101 Marketplace 1995
7 p. 5-
1 p.
artikel
102 Marketplace 1991
7 p. 5-6
2 p.
artikel
103 Marketplace 1992
7 p. 5-6
2 p.
artikel
104 Marketplace 1994
7 p. 5-
1 p.
artikel
105 Marketplace 1990
7 p. 6-
1 p.
artikel
106 Morris escapes jail Sterlicchi, John
1990
7 p. 1-2
2 p.
artikel
107 Motives underlying acts of computer abuse Horwitz, G.
1979
7 p. 7-8
2 p.
artikel
108 NCR customers sue over safety Menkus, Belden
1991
7 p. 3-
1 p.
artikel
109 Need for worldwide internet laws 1995
7 p. 10-
1 p.
artikel
110 New products 1991
7 p. 20-
1 p.
artikel
111 New security service 1986
7 p. 6-
1 p.
artikel
112 New spy-proof screen 1994
7 p. 3-
1 p.
artikel
113 No brut force 1980
7 p. 2-7
6 p.
artikel
114 North sea fraud: A story of a bored driller 1979
7 p. 11-
1 p.
artikel
115 Noted attorney to defend Poulsen Klopp, Charlotte
1991
7 p. 2-
1 p.
artikel
116 NT$50 million ATM fraud 1993
7 p. 3-
1 p.
artikel
117 OAD, CRANK and CLODO on the warpath 1980
7 p. 10-12
3 p.
artikel
118 One person's litter is another's scam 1994
7 p. 3-
1 p.
artikel
119 Other problems in Dublin 1980
7 p. 7-
1 p.
artikel
120 Password control Lawrence, L.G.
1993
7 p. 16-19
4 p.
artikel
121 Phrackers attack Canadian paper 1991
7 p. 3-4
2 p.
artikel
122 Piracy declines in USA 1995
7 p. 4-
1 p.
artikel
123 Police crack down on hacking 1995
7 p. 2-3
2 p.
artikel
124 Potential Netware security problem 1993
7 p. 5-
1 p.
artikel
125 Promis monitoring bank transactions Madsen, Wayne
1995
7 p. 7-
1 p.
artikel
126 Protecting your trading partners Sherwood, John
1990
7 p. 7-10
4 p.
artikel
127 Publications 1990
7 p. 20-
1 p.
artikel
128 Pupils cautioned for card fraud 1995
7 p. 3-
1 p.
artikel
129 Rambo the virus? 1990
7 p. 4-
1 p.
artikel
130 Reality failure 1990
7 p. 5-6
2 p.
artikel
131 Report predicts increased market for data protection 1985
7 p. 3-4
2 p.
artikel
132 Retail Virus Control Centre 1989
7 p. 4-
1 p.
artikel
133 Risk assessment 1989
7 p. 5-
1 p.
artikel
134 Risk vs reward in computer crime 1980
7 p. 9-10
2 p.
artikel
135 Row puts internet provision in doubt 1995
7 p. 4-
1 p.
artikel
136 School plagued by hackers 1994
7 p. 2-3
2 p.
artikel
137 Security aspects in it systems based on mobile micro computers Gliss, Hans
1994
7 p. 13-19
7 p.
artikel
138 Security: User requirements, workstations, and auditability Bhaskar, Krish
1987
7 p. 3-9
7 p.
artikel
139 Security with optical fibre Harrad, Jane
1990
7 p. 14-16
3 p.
artikel
140 Shop worker proves store's lack of security 1995
7 p. 3-
1 p.
artikel
141 Situations vacant 1985
7 p. 2-3
2 p.
artikel
142 Software glitch disrupts intercontinental air traffic Menkus, Belden
1992
7 p. 3-
1 p.
artikel
143 Some expert advice 1981
7 p. 15-16
2 p.
artikel
144 Some practical advice 1992
7 p. 6-12
7 p.
artikel
145 Sophos workshops 1989
7 p. 19-
1 p.
artikel
146 Springtime virus specials 1992
7 p. 4-
1 p.
artikel
147 Stamping out fraud Moffat, J.K.
1989
7 p. 8-9
2 p.
artikel
148 Stop press 1991
7 p. 20-
1 p.
artikel
149 Stop press 1993
7 p. 20-
1 p.
artikel
150 Stop press 1994
7 p. 20-
1 p.
artikel
151 Stop press 1995
7 p. 20-
1 p.
artikel
152 Stop press 1990
7 p. 20-
1 p.
artikel
153 Stop press 1989
7 p. 20-
1 p.
artikel
154 Strikes 1979
7 p. 8-9
2 p.
artikel
155 Sundry frauds 1979
7 p. 10-
1 p.
artikel
156 Technical review — Watchword Jackson, Keith
1988
7 p. 8-10
3 p.
artikel
157 Teenage hackers attack credit files Menkus, Belden
1992
7 p. 2-
1 p.
artikel
158 Terminal with built-in cryptography 1981
7 p. 13-15
3 p.
artikel
159 The computer virus crisis 1989
7 p. 17-18
2 p.
artikel
160 The cost of privacy protection 1981
7 p. 10-13
4 p.
artikel
161 The final days of reusable passwords Riggs, Brian
1994
7 p. 7-
1 p.
artikel
162 The good companions Tantam, Mark
1989
7 p. 10-13
4 p.
artikel
163 The 1989 International Computer Law Symposium 1989
7 p. 5-6
2 p.
artikel
164 The international handbook on computer crime Kelman, Alistair
1987
7 p. 14-16
3 p.
artikel
165 The Italian virus 1989
7 p. 7-8
2 p.
artikel
166 The limits of the law Sommer, Peter
1991
7 p. 6-16
11 p.
artikel
167 The mother of all safeguards 1995
7 p. 10-12
3 p.
artikel
168 The move to structured cabling Gahan, Chris
1990
7 p. 10-14
5 p.
artikel
169 The security phase of software development Robertson, Bernard
1992
7 p. 12-17
6 p.
artikel
170 The very newest audit technique 1979
7 p. 3-4
2 p.
artikel
171 Title: Computer-related risks Sommer, Peter
1995
7 p. 18-19
2 p.
artikel
172 Training centre settles out of court 1995
7 p. 4-
1 p.
artikel
173 Trusted systems readings 1989
7 p. 19-20
2 p.
artikel
174 Two US companies take steps to prevent hacking 1993
7 p. 4-
1 p.
artikel
175 Understanding the minds behind the viruses Goodwins, Rupert
1988
7 p. 3-4
2 p.
artikel
176 Unix secret at GCHQ 1989
7 p. 2-
1 p.
artikel
177 Up-to-the-minute network security Riggs, Brian
1994
7 p. 8-
1 p.
artikel
178 US computer security market approaches $3 billion 1987
7 p. 12-13
2 p.
artikel
179 US congress reviews computer fraud evidence 1986
7 p. 4-5
2 p.
artikel
180 US government and computer software 1986
7 p. 7-12
6 p.
artikel
181 US may dismantle civilian computer security structure Madsen, Wayne
1995
7 p. 8-
1 p.
artikel
182 US semiconductor chip protection act Greguras, Fred M
1985
7 p. 4-12
9 p.
artikel
183 US software firms cry foul to Government encyption laws Dunlap, Charlotte
1993
7 p. 2-3
2 p.
artikel
184 US used reseller is duped Menkus, Belden
1991
7 p. 5-
1 p.
artikel
185 Vaccine Jackson, Keith
1989
7 p. 13-16
4 p.
artikel
186 Video review 1992
7 p. 17-18
2 p.
artikel
187 Viewpoint Les Lawrence,
1992
7 p. 19-20
2 p.
artikel
188 Viruses creep into Japan 1992
7 p. 2-3
2 p.
artikel
189 What is a privacy infringement? 1979
7 p. 9-
1 p.
artikel
190 When does a perk become a crime? 1981
7 p. 9-10
2 p.
artikel
191 Why the cuckoo's egg might never have been written! Dwan, Berni
1995
7 p. 15-18
4 p.
artikel
                             191 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland