nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Apathy to computer crime ‘astounding’
|
Rees, Frank |
|
1989 |
11 |
4 |
p. 4- 1 p. |
artikel |
2 |
Australia re-examines software copyright
|
|
|
1989 |
11 |
4 |
p. 3-4 2 p. |
artikel |
3 |
Biometrics: the only positive identification
|
Wilding, Edward |
|
1989 |
11 |
4 |
p. 21-22 2 p. |
artikel |
4 |
Buy only from reliable sources
|
|
|
1989 |
11 |
4 |
p. 19-20 2 p. |
artikel |
5 |
Control risks forms new computer security company
|
|
|
1989 |
11 |
4 |
p. 3- 1 p. |
artikel |
6 |
Electronic data interchange, open networks and business security
|
Draper, John |
|
1989 |
11 |
4 |
p. 4-12 9 p. |
artikel |
7 |
Government data network contract goes to sophos
|
|
|
1989 |
11 |
4 |
p. 3- 1 p. |
artikel |
8 |
IBM VM CMS 4 open to a virus attack
|
|
|
1989 |
11 |
4 |
p. 20- 1 p. |
artikel |
9 |
Legislation to protect chips
|
|
|
1989 |
11 |
4 |
p. 4- 1 p. |
artikel |
10 |
Low-cost protection against electromagnetic eavesdropping
|
|
|
1989 |
11 |
4 |
p. 1-2 2 p. |
artikel |
11 |
Online auditing using microcomputers
|
Joseph Highland,, Harold |
|
1989 |
11 |
4 |
p. 23-24 2 p. |
artikel |
12 |
Product: Norton utilities, advanced edition
|
Jackson, Keith |
|
1989 |
11 |
4 |
p. 16-19 4 p. |
artikel |
13 |
Risk assessment for ‘con loss’ insurance
|
Sommer, Peter |
|
1989 |
11 |
4 |
p. 12-16 5 p. |
artikel |
14 |
Risk assessment seminar
|
|
|
1989 |
11 |
4 |
p. 24- 1 p. |
artikel |
15 |
‘1813’ strikes city university
|
Jackson, Keith |
|
1989 |
11 |
4 |
p. 19- 1 p. |
artikel |
16 |
The complete computer virus handbook
|
Jackson, Keith |
|
1989 |
11 |
4 |
p. 22-23 2 p. |
artikel |
17 |
Two new viruses pose threat
|
Highland, HaroldJoseph |
|
1989 |
11 |
4 |
p. 20-21 2 p. |
artikel |
18 |
Virus insurance from Lloyds of London
|
|
|
1989 |
11 |
4 |
p. 2-3 2 p. |
artikel |