Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             88 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A case study in selecting audit management software Nelms, Chris
1991
8 p. 9-14
6 p.
artikel
2 AG Solutions hires untrained IT staff 1997
8 p. 7-
1 p.
artikel
3 Ambitious squirrel takes a byte out of Nasdaq's image 1994
8 p. 16-
1 p.
artikel
4 An introduction to MVS SMF processing Crocker, Norman
1996
8 p. 15-22
8 p.
artikel
5 A reasonable agreement? Horan, Diane
1994
8 p. 11-12
2 p.
artikel
6 A structured control methodology to aid data integrity — part II Mitchell, John
1992
8 p. 7-11
5 p.
artikel
7 Barclaycard gets Tickit certification 1993
8 p. 19-
1 p.
artikel
8 Biometric security: Current status and legal concerns Bequai, August
1996
8 p. 26-30
5 p.
artikel
9 Browser to search in Chinese, Japanese and Korean 1997
8 p. 7-
1 p.
artikel
10 BSA to get tough on India's software pirates 1995
8 p. 20-
1 p.
artikel
11 Business continuity planning: Part 4 Hearnden, Keith
1995
8 p. 3-13
11 p.
artikel
12 Businesses at risk from distributed computer systems claims report 1995
8 p. 19-20
2 p.
artikel
13 CACS 96 — Texas-size auditing 1996
8 p. 33-36
4 p.
artikel
14 Comdisco research confirms net dependence & inadequate recovery plans 1997
8 p. 5-
1 p.
artikel
15 Compacs '96 Bently, David F.
1996
8 p. 37-39
3 p.
artikel
16 Computing services company warns businesses that the year 2000 could cost them millions 1995
8 p. 22-
1 p.
artikel
17 Confusion, expectation gaps and auditors Hinde, Stephen
1997
8 p. 2-4
3 p.
artikel
18 CSI crime report highlights large increase in business information theft 1995
8 p. 21-
1 p.
artikel
19 Data protection — Developments and abuses Hinde, Stephen
1995
8 p. 1-3
3 p.
artikel
20 Data protection, IT security and contracts 1997
8 p. 28-30
3 p.
artikel
21 DOS as an audit tool Mitchell, John
1991
8 p. 3-9
7 p.
artikel
22 EC information security initiative — The strategic direction International consultant,
1993
8 p. 3-10
8 p.
artikel
23 Editorial Hinde, Stephen
1992
8 p. 1-2
2 p.
artikel
24 Editorial 1991
8 p. 1-3
3 p.
artikel
25 Editorial Hinde, Stephen
1994
8 p. 1-3
3 p.
artikel
26 Editorial Hinde, Stephen
1993
8 p. 1-3
3 p.
artikel
27 Embedded systems & Year 2000 bug 1997
8 p. 7-
1 p.
artikel
28 Encoding technology to revolutionize business on the Web 1997
8 p. 6-
1 p.
artikel
29 European directive on data protection could see Australia blacklisted Rees, Frank
1996
8 p. 5-
1 p.
artikel
30 European survey finds 91% of banks confident about EMU 1996
8 p. 6-
1 p.
artikel
31 Evaluating investment in information technology Ford, John C.
1996
8 p. 7-14
8 p.
artikel
32 Events 1997
8 p. 36-
1 p.
artikel
33 Events 1996
8 p. 40-
1 p.
artikel
34 Events 1995
8 p. 24-
1 p.
artikel
35 Events 1991
8 p. 24-
1 p.
artikel
36 Events 1992
8 p. 20-
1 p.
artikel
37 Events 1993
8 p. 20-
1 p.
artikel
38 Events 1994
8 p. 20-
1 p.
artikel
39 First candidates of Business Continuity Institute accredited 1994
8 p. 17-
1 p.
artikel
40 Forum on Internet Domain Names 1997
8 p. 9-
1 p.
artikel
41 Fraud the unmanaged risk Hinde, Stephen
1996
8 p. 2-4
3 p.
artikel
42 Further clarity offered from new draft of statement on internal auditing standards 1994
8 p. 17-
1 p.
artikel
43 Getting to grips with Unix — A beginner's guide Nelms, Chris
1993
8 p. 14-18
5 p.
artikel
44 Government ignores £1.7 million chip theft loss 1995
8 p. 21-
1 p.
artikel
45 Guenier calls for IT work permits 1997
8 p. 8-
1 p.
artikel
46 Internal auditors — The new luddites Lindup, Ken
1995
8 p. 13-19
7 p.
artikel
47 Internet addiction: Disorder or cyberhoax? 1997
8 p. 5-
1 p.
artikel
48 Intrusion control and hacker hunting 1996
8 p. 31-32
2 p.
artikel
49 Laptops give away company secrets 1995
8 p. 21-
1 p.
artikel
50 Magnetic tape — the recipe for success/disaster Wilkinson, Clive
1992
8 p. 11-13
3 p.
artikel
51 Mainframe date bug problem looms close 1997
8 p. 8-
1 p.
artikel
52 Most business managers dissatisfied with exisiting IT systems 1996
8 p. 6-
1 p.
artikel
53 New audit tool claims to save more time 1995
8 p. 22-
1 p.
artikel
54 New Barings owners install AI system 1995
8 p. 21-
1 p.
artikel
55 New report defines risk factors involved in major IT projects 1994
8 p. 17-
1 p.
artikel
56 News 1992
8 p. 15-19
5 p.
artikel
57 News 1991
8 p. 21-23
3 p.
artikel
58 New service to provide a ‘healthcheck’ on network systems 1995
8 p. 22-
1 p.
artikel
59 New technique for simulating IT systems developed 1994
8 p. 19-
1 p.
artikel
60 New Windows version of COBRA risk management software released 1994
8 p. 19-
1 p.
artikel
61 Notebook: A pragmatic solution to configuration management Stock, Tony
1994
8 p. 12-16
5 p.
artikel
62 Novell lauches network security initiative 1993
8 p. 18-19
2 p.
artikel
63 OECD to renew security guidelines 1997
8 p. 26-27
2 p.
artikel
64 Office E-mails may trigger legal action 1997
8 p. 5-
1 p.
artikel
65 Organization B disaster recovery plan: Part 5 1994
8 p. 3-10
8 p.
artikel
66 Playboy files Telecom Act protest 1997
8 p. 6-
1 p.
artikel
67 Product review 1992
8 p. 14-15
2 p.
artikel
68 Readers' questionnaire results 1995
8 p. 23-
1 p.
artikel
69 SAP R/3 — Fraud monitoring and data-mining techniques Iyer, Nigel
1996
8 p. 23-25
3 p.
artikel
70 Security in directories Draper, John
1991
8 p. 14-21
8 p.
artikel
71 Security policies — A security officer's perspective McIlwraith, Angus
1993
8 p. 10-14
5 p.
artikel
72 Shutdown in passenger entry system could have been sabotage 1994
8 p. 18-
1 p.
artikel
73 Siemens Nixdorf to upgrade Police National Computer system 1994
8 p. 18-19
2 p.
artikel
74 Siemens, Sun sign smart card deal 1997
8 p. 7-
1 p.
artikel
75 Sizewell B nuclear reactor software awaits approval 1994
8 p. 16-17
2 p.
artikel
76 Software error leads to billion dollar windfall 1996
8 p. 6-
1 p.
artikel
77 Storage hardware failure accounts for nearly half of lost data 1996
8 p. 5-
1 p.
artikel
78 Suppliers will desert lawyer warns 1997
8 p. 8-
1 p.
artikel
79 Survey finds that one third of UK companies have no policy to backup business data 1995
8 p. 20-
1 p.
artikel
80 Take your PC for a spin 1993
8 p. 19-
1 p.
artikel
81 Teething problems for new Crown Court administration system 1994
8 p. 18-
1 p.
artikel
82 The audit of anti-virus controls in a netware environment Nelms, Chris
1997
8 p. 20-25
6 p.
artikel
83 The changing role of the IT auditor Ford, John C
1997
8 p. 10-19
10 p.
artikel
84 The future of EDP auditing — an Italian perspective Ongetta, Silvano
1992
8 p. 3-7
5 p.
artikel
85 User lose control of IT budgets 1993
8 p. 19-
1 p.
artikel
86 Violence in cyber-space: A legal minefield for U.S. employers Bequai, August
1997
8 p. 31-34
4 p.
artikel
87 Web-users can create easy names for tough URLs 1997
8 p. 9-
1 p.
artikel
88 Y2K again, and again… 1997
8 p. 35-
1 p.
artikel
                             88 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland