nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access control software—A survey of users
|
Parsons, Brian |
|
1988 |
|
2 |
p. 2-5 4 p. |
artikel |
2 |
Action required to prepare systems for EMU
|
|
|
1996 |
|
2 |
p. 5- 1 p. |
artikel |
3 |
Amendments to Data Protection Act
|
|
|
1996 |
|
2 |
p. 6- 1 p. |
artikel |
4 |
An electronic sampling tool kit?
|
Westwood, L.G. |
|
1988 |
|
2 |
p. 14-16 3 p. |
artikel |
5 |
Are banks obtaining customer data lawfully?
|
|
|
1993 |
|
2 |
p. 17- 1 p. |
artikel |
6 |
Auditing ADABAS
|
Webb, Alison |
|
1993 |
|
2 |
p. 9-15 7 p. |
artikel |
7 |
BA's computerized dirty tricks campaign
|
|
|
1993 |
|
2 |
p. 17- 1 p. |
artikel |
8 |
BSA calls for compromise on reverse engineering
|
|
|
1990 |
|
2 |
p. 20-26 7 p. |
artikel |
9 |
Business continuity planning
|
Hinde, Stephen |
|
1997 |
|
2 |
p. 2-5 4 p. |
artikel |
10 |
Businesses get Year 2000 ultimatum
|
|
|
1997 |
|
2 |
p. 6- 1 p. |
artikel |
11 |
Can 40-bit encryption do the job?
|
|
|
1993 |
|
2 |
p. 19- 1 p. |
artikel |
12 |
CA offers amnesty to software pirates
|
|
|
1993 |
|
2 |
p. 18- 1 p. |
artikel |
13 |
Chairman resigns following report on ambulance dispatch system
|
|
|
1993 |
|
2 |
p. 16- 1 p. |
artikel |
14 |
Cisco acts fast, fights off holiday bug
|
Kaneshige, Thomas |
|
1996 |
|
2 |
p. 6- 1 p. |
artikel |
15 |
Computer crime — a guide to PC security
|
|
|
1996 |
|
2 |
p. 5- 1 p. |
artikel |
16 |
Computer problems pose “significant safety risk” for Airbus
|
|
|
1996 |
|
2 |
p. 7- 1 p. |
artikel |
17 |
Computer security breaches affect half UK industry
|
|
|
1992 |
|
2 |
p. 16-19 4 p. |
artikel |
18 |
Development software
|
|
|
1990 |
|
2 |
p. 18-19 2 p. |
artikel |
19 |
EDI looks to the internet
|
Bequai, August |
|
1996 |
|
2 |
p. 27-31 5 p. |
artikel |
20 |
Editoral
|
|
|
1990 |
|
2 |
p. 1-2 2 p. |
artikel |
21 |
Editorial
|
|
|
1992 |
|
2 |
p. 1-3 3 p. |
artikel |
22 |
Editorial
|
|
|
1991 |
|
2 |
p. 1-2 2 p. |
artikel |
23 |
Editorial
|
|
|
1994 |
|
2 |
p. 1-3 3 p. |
artikel |
24 |
Editorial
|
Hinde, Stephen |
|
1993 |
|
2 |
p. 1-3 3 p. |
artikel |
25 |
Editorial
|
|
|
1988 |
|
2 |
p. 1- 1 p. |
artikel |
26 |
Electronic vandals disable college's network
|
|
|
1995 |
|
2 |
p. 14- 1 p. |
artikel |
27 |
Epos system failure at major high street store
|
|
|
1997 |
|
2 |
p. 7- 1 p. |
artikel |
28 |
European standards on the horizon
|
|
|
1997 |
|
2 |
p. 22-26 5 p. |
artikel |
29 |
Events
|
|
|
1995 |
|
2 |
p. 16- 1 p. |
artikel |
30 |
Events
|
|
|
1996 |
|
2 |
p. 36- 1 p. |
artikel |
31 |
Events
|
|
|
1992 |
|
2 |
p. 19-20 2 p. |
artikel |
32 |
Events
|
|
|
1993 |
|
2 |
p. 19-20 2 p. |
artikel |
33 |
Events
|
|
|
1994 |
|
2 |
p. 20- 1 p. |
artikel |
34 |
Events
|
|
|
1991 |
|
2 |
p. 23-24 2 p. |
artikel |
35 |
Events
|
|
|
1988 |
|
2 |
p. 21- 1 p. |
artikel |
36 |
Events
|
|
|
1990 |
|
2 |
p. 26-27 2 p. |
artikel |
37 |
Failure of ticket computer disrupts Amtrack
|
|
|
1997 |
|
2 |
p. 7- 1 p. |
artikel |
38 |
Flaw in faulty Windows 3.1 calculator to be fixed
|
|
|
1995 |
|
2 |
p. 15- 1 p. |
artikel |
39 |
Forthcoming events relevant to computer audit, security and control
|
|
|
1997 |
|
2 |
p. 32- 1 p. |
artikel |
40 |
Fundamentals of contingency planning
|
Pursall, Keith R |
|
1992 |
|
2 |
p. 3-5 3 p. |
artikel |
41 |
Glitch in software causes NYSE delay
|
Sterlicchi, John |
|
1996 |
|
2 |
p. 7- 1 p. |
artikel |
42 |
Hang Seng drops 500 points due to software error
|
|
|
1997 |
|
2 |
p. 7- 1 p. |
artikel |
43 |
Information Management in Crisis: Getting Value For Money From IT Investments by Rethinking the Management of Information and Technology
|
Collin, Nick |
|
1995 |
|
2 |
p. 6-11 6 p. |
artikel |
44 |
Information risk assessment, risk analysis and risk management: The IRR research model
|
Badenhorst, Karin |
|
1992 |
|
2 |
p. 8-16 9 p. |
artikel |
45 |
Information Security Evaluation Criteria Conference
|
|
|
1990 |
|
2 |
p. 12-18 7 p. |
artikel |
46 |
Information systems security and the multinational enterprise (1)
|
Blatchford, Clive |
|
1996 |
|
2 |
p. 18-26 9 p. |
artikel |
47 |
Information systems security: The ‘meta’ framework
|
|
|
1994 |
|
2 |
p. 3-9 7 p. |
artikel |
48 |
Insurers get advice on data protection
|
|
|
1994 |
|
2 |
p. 19- 1 p. |
artikel |
49 |
Intelligent security reporting: Auditing security logs
|
Crocker, Norman |
|
1997 |
|
2 |
p. 8-17 10 p. |
artikel |
50 |
Internet chat
|
|
|
1997 |
|
2 |
p. 30-31 2 p. |
artikel |
51 |
IT contingency planning: A public sector perspective, part 2
|
Kennedy, Damien |
|
1994 |
|
2 |
p. 9-15 7 p. |
artikel |
52 |
IT security testing, a practical guide — Part 4
|
Robertson, Bernard |
|
1993 |
|
2 |
p. 3-8 6 p. |
artikel |
53 |
Justifying the costs of it
|
Griffiths, Catherine |
|
1990 |
|
2 |
p. 2-6 5 p. |
artikel |
54 |
Learning from failure and success
|
Williams, Paul |
|
1997 |
|
2 |
p. 27-29 3 p. |
artikel |
55 |
8LGM hacked through back doors
|
|
|
1993 |
|
2 |
p. 17-18 2 p. |
artikel |
56 |
Mainframe viruses on the rise
|
|
|
1993 |
|
2 |
p. 18- 1 p. |
artikel |
57 |
Matrix layout 2.0
|
|
|
1990 |
|
2 |
p. 19-20 2 p. |
artikel |
58 |
Maximizing return on technology investments (1)
|
Micallef, Mario |
|
1996 |
|
2 |
p. 8-17 10 p. |
artikel |
59 |
MIS/Elsevier Seminars for EDP audit and data security
|
|
|
1990 |
|
2 |
p. 28- 1 p. |
artikel |
60 |
£200m Year 2000 bill for UK National Health Service
|
|
|
1997 |
|
2 |
p. 7- 1 p. |
artikel |
61 |
NASD criticized over Nasdaq outages
|
|
|
1995 |
|
2 |
p. 14- 1 p. |
artikel |
62 |
Net-pottering, and two interesting sites about year 2000
|
|
|
1996 |
|
2 |
p. 35- 1 p. |
artikel |
63 |
News
|
|
|
1991 |
|
2 |
p. 17-23 7 p. |
artikel |
64 |
News
|
|
|
1988 |
|
2 |
p. 17-19 3 p. |
artikel |
65 |
New Unix firewall claims to reduce downtime to less than two hours per year
|
|
|
1995 |
|
2 |
p. 14- 1 p. |
artikel |
66 |
New Virus defence database
|
|
|
1995 |
|
2 |
p. 14- 1 p. |
artikel |
67 |
No front teeth?
|
Hinde, Stephen |
|
1996 |
|
2 |
p. 2-4 3 p. |
artikel |
68 |
No keyboard will hack
|
|
|
1994 |
|
2 |
p. 19- 1 p. |
artikel |
69 |
Nuclear electric rejects concern over software safety
|
|
|
1993 |
|
2 |
p. 17- 1 p. |
artikel |
70 |
Nurse-hacker alters hospital prescriptions
|
|
|
1994 |
|
2 |
p. 18-19 2 p. |
artikel |
71 |
Operation sundevil II?
|
|
|
1993 |
|
2 |
p. 17- 1 p. |
artikel |
72 |
Password traps computer fraudster
|
|
|
1993 |
|
2 |
p. 18-19 2 p. |
artikel |
73 |
Practical LAN auditing
|
Kinne, Dan |
|
1991 |
|
2 |
p. 12-15 4 p. |
artikel |
74 |
Product reviews
|
|
|
1991 |
|
2 |
p. 15-17 3 p. |
artikel |
75 |
Protecting PC systems
|
Hiles, Andrew |
|
1992 |
|
2 |
p. 5-8 4 p. |
artikel |
76 |
REMOVED: Workflow software: The value for auditors
|
Lilley, Vic |
|
1994 |
|
2 |
p. 15-18 4 p. |
artikel |
77 |
Safety critical software
|
Hinde, Stephen |
|
1995 |
|
2 |
p. 1-2 2 p. |
artikel |
78 |
Satellite-secrecy contract
|
|
|
1994 |
|
2 |
p. 19- 1 p. |
artikel |
79 |
Software security: frail copyrights or muscle-bound patents?
|
|
|
1995 |
|
2 |
p. 15- 1 p. |
artikel |
80 |
Subscription details
|
|
|
1988 |
|
2 |
p. 23- 1 p. |
artikel |
81 |
Survey reveals increase in threats to corporate information security
|
|
|
1995 |
|
2 |
p. 14-15 2 p. |
artikel |
82 |
Sweep against UK virus writers
|
|
|
1993 |
|
2 |
p. 16-17 2 p. |
artikel |
83 |
System abuse the soft way
|
Willott, Roger |
|
1988 |
|
2 |
p. 6-8 3 p. |
artikel |
84 |
The auditor's role in creating successful systems
|
Morriss, Peter W. |
|
1990 |
|
2 |
p. 7-12 6 p. |
artikel |
85 |
The Court's Perspective on Defective Computer Systerms: Lessons to Learn
|
Parry, Rex |
|
1995 |
|
2 |
p. 3-6 4 p. |
artikel |
86 |
The problem with portables
|
|
|
1993 |
|
2 |
p. 16- 1 p. |
artikel |
87 |
The psychology of computer crime
|
Fielding, Guy |
|
1988 |
|
2 |
p. 9-13 5 p. |
artikel |
88 |
The US IT security market and its legal trappings
|
Bequai, August |
|
1997 |
|
2 |
p. 18-21 4 p. |
artikel |
89 |
Throwing good money after bad?
|
|
|
1993 |
|
2 |
p. 15-16 2 p. |
artikel |
90 |
Trademarks in cyberspace
|
Bryan, Howard |
|
1996 |
|
2 |
p. 32-34 3 p. |
artikel |
91 |
Treasury management systems—Key concepts
|
Bhaskar, Krish |
|
1991 |
|
2 |
p. 2-12 11 p. |
artikel |
92 |
UK government reviews software copyright laws
|
|
|
1993 |
|
2 |
p. 19- 1 p. |
artikel |
93 |
UK's most wanted CD software pirate arrested
|
|
|
1996 |
|
2 |
p. 6- 1 p. |
artikel |
94 |
UK software company faces £16 million writ over failed Unix switch
|
|
|
1995 |
|
2 |
p. 15- 1 p. |
artikel |
95 |
US Defense call for system tests for security weaknesses
|
|
|
1997 |
|
2 |
p. 6- 1 p. |
artikel |
96 |
US encryption laws opposed by industry
|
|
|
1997 |
|
2 |
p. 6- 1 p. |
artikel |
97 |
Vulnerabilities in council system identified
|
|
|
1993 |
|
2 |
p. 16- 1 p. |
artikel |
98 |
Windows virus
|
|
|
1993 |
|
2 |
p. 18- 1 p. |
artikel |