nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Customer-Driven Approach to Business Resumption Planning
|
Helsing, Cheryl W. |
|
1993 |
2 |
1 |
p. 48-56 |
artikel |
2 |
Computers at Risk: Does Anyone Remember?
|
McDonald, Chris |
|
1993 |
2 |
1 |
p. 9-12 |
artikel |
3 |
Confidentiality of Information and Personal Privacy
|
Parker, Donn B. |
|
1993 |
2 |
1 |
p. 13-17 |
artikel |
4 |
From the Editor
|
Parker, Donn B. |
|
1993 |
2 |
1 |
p. 3-4 |
artikel |
5 |
Information Security: Adapting to Survive
|
Baskerville, Richard |
|
1993 |
2 |
1 |
p. 40-47 |
artikel |
6 |
Is Error Detection a Security Concern?
|
List, William |
|
1993 |
2 |
1 |
p. 22-24 |
artikel |
7 |
Is Network Security a Contradiction in Terms?
|
Poore, Ralph Spencer |
|
1993 |
2 |
1 |
p. 18-21 |
artikel |
8 |
Limitations of Relational Data Base Access Controls
|
Sandhu, Ravi S. |
|
1993 |
2 |
1 |
p. 57-72 |
artikel |
9 |
Macintosh Security and Data Integrity Products
|
Sobol, Michael I. |
|
1993 |
2 |
1 |
p. 25-29 |
artikel |
10 |
MVS Integrity: The Intruder's Point of View
|
Goldis, Peter D. |
|
1993 |
2 |
1 |
p. 33-39 |
artikel |
11 |
Network Security
|
Moeller, Robert R. |
|
1993 |
2 |
1 |
p. 30-32 |
artikel |
12 |
Reevaluating Information Ownership
|
Demaio, Harry B. |
|
1993 |
2 |
1 |
p. 5-8 |
artikel |