nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1982 |
1 |
2 |
p. 193-199 7 p. |
artikel |
2 |
A guide to NBS computer security literature
|
Highland, EstherHarris |
|
1982 |
1 |
2 |
p. 164-176 13 p. |
artikel |
3 |
A multidisciplinary approach to the investigation of computer abuse incidents
|
Moulton, Rolf |
|
1982 |
1 |
2 |
p. 146-151 6 p. |
artikel |
4 |
A systematic approach to data security
|
Courtney Jr., Robert H. |
|
1982 |
1 |
2 |
p. 99-112 14 p. |
artikel |
5 |
Calendar
|
|
|
1982 |
1 |
2 |
p. 200- 1 p. |
artikel |
6 |
Cryptography old and new
|
Willett, Michael |
|
1982 |
1 |
2 |
p. 177-186 10 p. |
artikel |
7 |
Editorial
|
Highland, Harold Joseph |
|
1982 |
1 |
2 |
p. 95- 1 p. |
artikel |
8 |
Management guide to computer security
|
Highland, Harold Joseph |
|
1982 |
1 |
2 |
p. 191-192 2 p. |
artikel |
9 |
Managing information security: A program for the electronic information age
|
Highland, Harold Joseph |
|
1982 |
1 |
2 |
p. 191- 1 p. |
artikel |
10 |
New members of the international board of editors
|
|
|
1982 |
1 |
2 |
p. 97-98 2 p. |
artikel |
11 |
On security measures in distributed computer systems
|
Blom, Rolf |
|
1982 |
1 |
2 |
p. 113-122 10 p. |
artikel |
12 |
Policies for deterring computer abuse
|
Wood, Charles Cresson |
|
1982 |
1 |
2 |
p. 139-145 7 p. |
artikel |
13 |
Professional organizations in computer security
|
|
|
1982 |
1 |
2 |
p. 187-190 4 p. |
artikel |
14 |
System security standard for electronic data processing
|
Highland, Esther H. |
|
1982 |
1 |
2 |
p. 192- 1 p. |
artikel |
15 |
Teaching computer security: A course outline
|
Neugent, William |
|
1982 |
1 |
2 |
p. 152-163 12 p. |
artikel |
16 |
The control of computer-based fraud
|
Carroll, John M. |
|
1982 |
1 |
2 |
p. 123-138 16 p. |
artikel |