nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Are banks obtaining customer data lawfully?
|
|
|
1993 |
1993 |
2 |
p. 17- 1 p. |
artikel |
2 |
Auditing ADABAS
|
Webb, Alison |
|
1993 |
1993 |
2 |
p. 9-15 7 p. |
artikel |
3 |
BA's computerized dirty tricks campaign
|
|
|
1993 |
1993 |
2 |
p. 17- 1 p. |
artikel |
4 |
Can 40-bit encryption do the job?
|
|
|
1993 |
1993 |
2 |
p. 19- 1 p. |
artikel |
5 |
CA offers amnesty to software pirates
|
|
|
1993 |
1993 |
2 |
p. 18- 1 p. |
artikel |
6 |
Chairman resigns following report on ambulance dispatch system
|
|
|
1993 |
1993 |
2 |
p. 16- 1 p. |
artikel |
7 |
Editorial
|
Hinde, Stephen |
|
1993 |
1993 |
2 |
p. 1-3 3 p. |
artikel |
8 |
Events
|
|
|
1993 |
1993 |
2 |
p. 19-20 2 p. |
artikel |
9 |
IT security testing, a practical guide — Part 4
|
Robertson, Bernard |
|
1993 |
1993 |
2 |
p. 3-8 6 p. |
artikel |
10 |
8LGM hacked through back doors
|
|
|
1993 |
1993 |
2 |
p. 17-18 2 p. |
artikel |
11 |
Mainframe viruses on the rise
|
|
|
1993 |
1993 |
2 |
p. 18- 1 p. |
artikel |
12 |
Nuclear electric rejects concern over software safety
|
|
|
1993 |
1993 |
2 |
p. 17- 1 p. |
artikel |
13 |
Operation sundevil II?
|
|
|
1993 |
1993 |
2 |
p. 17- 1 p. |
artikel |
14 |
Password traps computer fraudster
|
|
|
1993 |
1993 |
2 |
p. 18-19 2 p. |
artikel |
15 |
Sweep against UK virus writers
|
|
|
1993 |
1993 |
2 |
p. 16-17 2 p. |
artikel |
16 |
The problem with portables
|
|
|
1993 |
1993 |
2 |
p. 16- 1 p. |
artikel |
17 |
Throwing good money after bad?
|
|
|
1993 |
1993 |
2 |
p. 15-16 2 p. |
artikel |
18 |
UK government reviews software copyright laws
|
|
|
1993 |
1993 |
2 |
p. 19- 1 p. |
artikel |
19 |
Vulnerabilities in council system identified
|
|
|
1993 |
1993 |
2 |
p. 16- 1 p. |
artikel |
20 |
Windows virus
|
|
|
1993 |
1993 |
2 |
p. 18- 1 p. |
artikel |