nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of Recent Articles and Literature
|
|
|
1992 |
11 |
4 |
p. 375-383 9 p. |
artikel |
2 |
A report on the joint CIMA and IIA computer fraud survey
|
Dixon, R. |
|
1992 |
11 |
4 |
p. 307-313 7 p. |
artikel |
3 |
Calendar
|
|
|
1992 |
11 |
4 |
p. 384-385 2 p. |
artikel |
4 |
From the editor
|
|
|
1992 |
11 |
4 |
p. 292-293 2 p. |
artikel |
5 |
Guide for authors
|
|
|
1992 |
11 |
4 |
p. 386- 1 p. |
artikel |
6 |
IFIP TC11 news
|
Highland, HaroldJoseph |
|
1992 |
11 |
4 |
p. 341-343 3 p. |
artikel |
7 |
IFIP technical committee 11
|
|
|
1992 |
11 |
4 |
p. 371-373 3 p. |
artikel |
8 |
Information security administration model: A management model to help identify the best practices of the administration function within the security group
|
Janus Associates, |
|
1992 |
11 |
4 |
p. 327-340 14 p. |
artikel |
9 |
International board of referees
|
|
|
1992 |
11 |
4 |
p. 345- 1 p. |
artikel |
10 |
Intrusion detection: Its role and validation
|
Liepens, G.E. |
|
1992 |
11 |
4 |
p. 347-355 9 p. |
artikel |
11 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1992 |
11 |
4 |
p. 294-306 13 p. |
artikel |
12 |
Some extensions to the lattice model for computer security
|
Wu, Jie |
|
1992 |
11 |
4 |
p. 357-369 13 p. |
artikel |
13 |
The implementation of TSS
|
de Vries, T.P. |
|
1992 |
11 |
4 |
p. 315-325 11 p. |
artikel |