nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A case study in selecting audit management software
|
Nelms, Chris |
|
1991 |
|
8 |
p. 9-14 6 p. |
artikel |
2 |
AG Solutions hires untrained IT staff
|
|
|
1997 |
|
8 |
p. 7- 1 p. |
artikel |
3 |
Ambitious squirrel takes a byte out of Nasdaq's image
|
|
|
1994 |
|
8 |
p. 16- 1 p. |
artikel |
4 |
An introduction to MVS SMF processing
|
Crocker, Norman |
|
1996 |
|
8 |
p. 15-22 8 p. |
artikel |
5 |
A reasonable agreement?
|
Horan, Diane |
|
1994 |
|
8 |
p. 11-12 2 p. |
artikel |
6 |
A structured control methodology to aid data integrity — part II
|
Mitchell, John |
|
1992 |
|
8 |
p. 7-11 5 p. |
artikel |
7 |
Barclaycard gets Tickit certification
|
|
|
1993 |
|
8 |
p. 19- 1 p. |
artikel |
8 |
Biometric security: Current status and legal concerns
|
Bequai, August |
|
1996 |
|
8 |
p. 26-30 5 p. |
artikel |
9 |
Browser to search in Chinese, Japanese and Korean
|
|
|
1997 |
|
8 |
p. 7- 1 p. |
artikel |
10 |
BSA to get tough on India's software pirates
|
|
|
1995 |
|
8 |
p. 20- 1 p. |
artikel |
11 |
Business continuity planning: Part 4
|
Hearnden, Keith |
|
1995 |
|
8 |
p. 3-13 11 p. |
artikel |
12 |
Businesses at risk from distributed computer systems claims report
|
|
|
1995 |
|
8 |
p. 19-20 2 p. |
artikel |
13 |
CACS 96 — Texas-size auditing
|
|
|
1996 |
|
8 |
p. 33-36 4 p. |
artikel |
14 |
Comdisco research confirms net dependence & inadequate recovery plans
|
|
|
1997 |
|
8 |
p. 5- 1 p. |
artikel |
15 |
Compacs '96
|
Bently, David F. |
|
1996 |
|
8 |
p. 37-39 3 p. |
artikel |
16 |
Computing services company warns businesses that the year 2000 could cost them millions
|
|
|
1995 |
|
8 |
p. 22- 1 p. |
artikel |
17 |
Confusion, expectation gaps and auditors
|
Hinde, Stephen |
|
1997 |
|
8 |
p. 2-4 3 p. |
artikel |
18 |
CSI crime report highlights large increase in business information theft
|
|
|
1995 |
|
8 |
p. 21- 1 p. |
artikel |
19 |
Data protection — Developments and abuses
|
Hinde, Stephen |
|
1995 |
|
8 |
p. 1-3 3 p. |
artikel |
20 |
Data protection, IT security and contracts
|
|
|
1997 |
|
8 |
p. 28-30 3 p. |
artikel |
21 |
DOS as an audit tool
|
Mitchell, John |
|
1991 |
|
8 |
p. 3-9 7 p. |
artikel |
22 |
EC information security initiative — The strategic direction
|
International consultant, |
|
1993 |
|
8 |
p. 3-10 8 p. |
artikel |
23 |
Editorial
|
Hinde, Stephen |
|
1992 |
|
8 |
p. 1-2 2 p. |
artikel |
24 |
Editorial
|
|
|
1991 |
|
8 |
p. 1-3 3 p. |
artikel |
25 |
Editorial
|
Hinde, Stephen |
|
1994 |
|
8 |
p. 1-3 3 p. |
artikel |
26 |
Editorial
|
Hinde, Stephen |
|
1993 |
|
8 |
p. 1-3 3 p. |
artikel |
27 |
Embedded systems & Year 2000 bug
|
|
|
1997 |
|
8 |
p. 7- 1 p. |
artikel |
28 |
Encoding technology to revolutionize business on the Web
|
|
|
1997 |
|
8 |
p. 6- 1 p. |
artikel |
29 |
European directive on data protection could see Australia blacklisted
|
Rees, Frank |
|
1996 |
|
8 |
p. 5- 1 p. |
artikel |
30 |
European survey finds 91% of banks confident about EMU
|
|
|
1996 |
|
8 |
p. 6- 1 p. |
artikel |
31 |
Evaluating investment in information technology
|
Ford, John C. |
|
1996 |
|
8 |
p. 7-14 8 p. |
artikel |
32 |
Events
|
|
|
1997 |
|
8 |
p. 36- 1 p. |
artikel |
33 |
Events
|
|
|
1996 |
|
8 |
p. 40- 1 p. |
artikel |
34 |
Events
|
|
|
1995 |
|
8 |
p. 24- 1 p. |
artikel |
35 |
Events
|
|
|
1991 |
|
8 |
p. 24- 1 p. |
artikel |
36 |
Events
|
|
|
1992 |
|
8 |
p. 20- 1 p. |
artikel |
37 |
Events
|
|
|
1993 |
|
8 |
p. 20- 1 p. |
artikel |
38 |
Events
|
|
|
1994 |
|
8 |
p. 20- 1 p. |
artikel |
39 |
First candidates of Business Continuity Institute accredited
|
|
|
1994 |
|
8 |
p. 17- 1 p. |
artikel |
40 |
Forum on Internet Domain Names
|
|
|
1997 |
|
8 |
p. 9- 1 p. |
artikel |
41 |
Fraud the unmanaged risk
|
Hinde, Stephen |
|
1996 |
|
8 |
p. 2-4 3 p. |
artikel |
42 |
Further clarity offered from new draft of statement on internal auditing standards
|
|
|
1994 |
|
8 |
p. 17- 1 p. |
artikel |
43 |
Getting to grips with Unix — A beginner's guide
|
Nelms, Chris |
|
1993 |
|
8 |
p. 14-18 5 p. |
artikel |
44 |
Government ignores £1.7 million chip theft loss
|
|
|
1995 |
|
8 |
p. 21- 1 p. |
artikel |
45 |
Guenier calls for IT work permits
|
|
|
1997 |
|
8 |
p. 8- 1 p. |
artikel |
46 |
Internal auditors — The new luddites
|
Lindup, Ken |
|
1995 |
|
8 |
p. 13-19 7 p. |
artikel |
47 |
Internet addiction: Disorder or cyberhoax?
|
|
|
1997 |
|
8 |
p. 5- 1 p. |
artikel |
48 |
Intrusion control and hacker hunting
|
|
|
1996 |
|
8 |
p. 31-32 2 p. |
artikel |
49 |
Laptops give away company secrets
|
|
|
1995 |
|
8 |
p. 21- 1 p. |
artikel |
50 |
Magnetic tape — the recipe for success/disaster
|
Wilkinson, Clive |
|
1992 |
|
8 |
p. 11-13 3 p. |
artikel |
51 |
Mainframe date bug problem looms close
|
|
|
1997 |
|
8 |
p. 8- 1 p. |
artikel |
52 |
Most business managers dissatisfied with exisiting IT systems
|
|
|
1996 |
|
8 |
p. 6- 1 p. |
artikel |
53 |
New audit tool claims to save more time
|
|
|
1995 |
|
8 |
p. 22- 1 p. |
artikel |
54 |
New Barings owners install AI system
|
|
|
1995 |
|
8 |
p. 21- 1 p. |
artikel |
55 |
New report defines risk factors involved in major IT projects
|
|
|
1994 |
|
8 |
p. 17- 1 p. |
artikel |
56 |
News
|
|
|
1992 |
|
8 |
p. 15-19 5 p. |
artikel |
57 |
News
|
|
|
1991 |
|
8 |
p. 21-23 3 p. |
artikel |
58 |
New service to provide a ‘healthcheck’ on network systems
|
|
|
1995 |
|
8 |
p. 22- 1 p. |
artikel |
59 |
New technique for simulating IT systems developed
|
|
|
1994 |
|
8 |
p. 19- 1 p. |
artikel |
60 |
New Windows version of COBRA risk management software released
|
|
|
1994 |
|
8 |
p. 19- 1 p. |
artikel |
61 |
Notebook: A pragmatic solution to configuration management
|
Stock, Tony |
|
1994 |
|
8 |
p. 12-16 5 p. |
artikel |
62 |
Novell lauches network security initiative
|
|
|
1993 |
|
8 |
p. 18-19 2 p. |
artikel |
63 |
OECD to renew security guidelines
|
|
|
1997 |
|
8 |
p. 26-27 2 p. |
artikel |
64 |
Office E-mails may trigger legal action
|
|
|
1997 |
|
8 |
p. 5- 1 p. |
artikel |
65 |
Organization B disaster recovery plan: Part 5
|
|
|
1994 |
|
8 |
p. 3-10 8 p. |
artikel |
66 |
Playboy files Telecom Act protest
|
|
|
1997 |
|
8 |
p. 6- 1 p. |
artikel |
67 |
Product review
|
|
|
1992 |
|
8 |
p. 14-15 2 p. |
artikel |
68 |
Readers' questionnaire results
|
|
|
1995 |
|
8 |
p. 23- 1 p. |
artikel |
69 |
SAP R/3 — Fraud monitoring and data-mining techniques
|
Iyer, Nigel |
|
1996 |
|
8 |
p. 23-25 3 p. |
artikel |
70 |
Security in directories
|
Draper, John |
|
1991 |
|
8 |
p. 14-21 8 p. |
artikel |
71 |
Security policies — A security officer's perspective
|
McIlwraith, Angus |
|
1993 |
|
8 |
p. 10-14 5 p. |
artikel |
72 |
Shutdown in passenger entry system could have been sabotage
|
|
|
1994 |
|
8 |
p. 18- 1 p. |
artikel |
73 |
Siemens Nixdorf to upgrade Police National Computer system
|
|
|
1994 |
|
8 |
p. 18-19 2 p. |
artikel |
74 |
Siemens, Sun sign smart card deal
|
|
|
1997 |
|
8 |
p. 7- 1 p. |
artikel |
75 |
Sizewell B nuclear reactor software awaits approval
|
|
|
1994 |
|
8 |
p. 16-17 2 p. |
artikel |
76 |
Software error leads to billion dollar windfall
|
|
|
1996 |
|
8 |
p. 6- 1 p. |
artikel |
77 |
Storage hardware failure accounts for nearly half of lost data
|
|
|
1996 |
|
8 |
p. 5- 1 p. |
artikel |
78 |
Suppliers will desert lawyer warns
|
|
|
1997 |
|
8 |
p. 8- 1 p. |
artikel |
79 |
Survey finds that one third of UK companies have no policy to backup business data
|
|
|
1995 |
|
8 |
p. 20- 1 p. |
artikel |
80 |
Take your PC for a spin
|
|
|
1993 |
|
8 |
p. 19- 1 p. |
artikel |
81 |
Teething problems for new Crown Court administration system
|
|
|
1994 |
|
8 |
p. 18- 1 p. |
artikel |
82 |
The audit of anti-virus controls in a netware environment
|
Nelms, Chris |
|
1997 |
|
8 |
p. 20-25 6 p. |
artikel |
83 |
The changing role of the IT auditor
|
Ford, John C |
|
1997 |
|
8 |
p. 10-19 10 p. |
artikel |
84 |
The future of EDP auditing — an Italian perspective
|
Ongetta, Silvano |
|
1992 |
|
8 |
p. 3-7 5 p. |
artikel |
85 |
User lose control of IT budgets
|
|
|
1993 |
|
8 |
p. 19- 1 p. |
artikel |
86 |
Violence in cyber-space: A legal minefield for U.S. employers
|
Bequai, August |
|
1997 |
|
8 |
p. 31-34 4 p. |
artikel |
87 |
Web-users can create easy names for tough URLs
|
|
|
1997 |
|
8 |
p. 9- 1 p. |
artikel |
88 |
Y2K again, and again…
|
|
|
1997 |
|
8 |
p. 35- 1 p. |
artikel |