nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Calendar 1992
|
|
|
1992 |
1 |
1 |
p. 72 |
artikel |
2 |
Callback Security
|
Sobol, Michael I. |
|
1992 |
1 |
1 |
p. 23-26 |
artikel |
3 |
Computer Viruses
|
Moeller, Robert R. |
|
1992 |
1 |
1 |
p. 27-30 |
artikel |
4 |
Counteracting Viruses in an MS-DOS Environment
|
Peterson, A. Padgett |
|
1992 |
1 |
1 |
p. 58-65 |
artikel |
5 |
Cryptography and National Security
|
Weingarten, Fred W. |
|
1992 |
1 |
1 |
p. 9-12 |
artikel |
6 |
Ensuring the Timely Destruction of Information
|
Poore, Ralph Spencer |
|
1992 |
1 |
1 |
p. 17-19 |
artikel |
7 |
From The Editor
|
Parker, Donn B. |
|
1992 |
1 |
1 |
p. 3 |
artikel |
8 |
ID Verification in Integrated Systems
|
Muir, John R. |
|
1992 |
1 |
1 |
p. 66-71 |
artikel |
9 |
Micro-Mainframe Security
|
Rivera, Angel L. |
|
1992 |
1 |
1 |
p. 31-41 |
artikel |
10 |
Software Law and Its Perils : Copyright, Patent, and the Racketeering Statute
|
Biles, George E. |
|
1992 |
1 |
1 |
p. 42-49 |
artikel |
11 |
Teaching the Ethical Use of Information Assets
|
Parker, Donn B. |
|
1992 |
1 |
1 |
p. 13-16 |
artikel |
12 |
The Case for Integrating Quality, Security, and Continuity Programs
|
DeMaio, Harry B. |
|
1992 |
1 |
1 |
p. 5-8 |
artikel |
13 |
The Dangers of Legislating Controls on Information Technology
|
Podesta, John D. |
|
1992 |
1 |
1 |
p. 20-22 |
artikel |
14 |
Trends in Operating System Security
|
Finzel, Tobie |
|
1992 |
1 |
1 |
p. 50-57 |
artikel |