nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An evaluation of HP-UX (UNIX) for database protection using the European ITSEC
|
Caelli, W.J. |
|
1992 |
11 |
5 |
p. 463-479 17 p. |
artikel |
2 |
Automated audit trail analysis for intrusion detection
|
Lunt, Teresa |
|
1992 |
11 |
5 |
p. 492- 1 p. |
artikel |
3 |
Bombed out
|
|
|
1992 |
11 |
5 |
p. 488- 1 p. |
artikel |
4 |
BSA sweep on benelux region
|
|
|
1992 |
11 |
5 |
p. 486-487 2 p. |
artikel |
5 |
Calendar
|
|
|
1992 |
11 |
5 |
p. 493-494 2 p. |
artikel |
6 |
City firms rally round after IRA bombing
|
|
|
1992 |
11 |
5 |
p. 485- 1 p. |
artikel |
7 |
Computer files need more safeguards, hospitals told
|
Ha, Tu Thanh |
|
1992 |
11 |
5 |
p. 487- 1 p. |
artikel |
8 |
Crime sans frontiers or the end of liberty
|
Warren, Peter |
|
1992 |
11 |
5 |
p. 491- 1 p. |
artikel |
9 |
Data security in a fixed-model arithmetic coding compression algorithm
|
Bergen, Helen A. |
|
1992 |
11 |
5 |
p. 445-461 17 p. |
artikel |
10 |
Dirty macs
|
|
|
1992 |
11 |
5 |
p. 485- 1 p. |
artikel |
11 |
East Asian Gang counterfeits microsoft MS-DOS holograms
|
Evans, David |
|
1992 |
11 |
5 |
p. 487- 1 p. |
artikel |
12 |
Enemy action
|
|
|
1992 |
11 |
5 |
p. 490- 1 p. |
artikel |
13 |
FAST corporate membership
|
|
|
1992 |
11 |
5 |
p. 487- 1 p. |
artikel |
14 |
FAST pushes for tough action on unix piracy
|
Fawcett, Neil |
|
1992 |
11 |
5 |
p. 487-488 2 p. |
artikel |
15 |
FBI endangering privacy for all
|
Rotenberg, Marc |
|
1992 |
11 |
5 |
p. 489- 1 p. |
artikel |
16 |
Finding a crime to fit the punishment
|
Sommer, Peter |
|
1992 |
11 |
5 |
p. 491-492 2 p. |
artikel |
17 |
From the editor
|
|
|
1992 |
11 |
5 |
p. 388-389 2 p. |
artikel |
18 |
German pirates avoid blacklist
|
Fawcett, Neil |
|
1992 |
11 |
5 |
p. 489- 1 p. |
artikel |
19 |
Government eavesdropping-should consumers pay?
|
Madsen, Wayne |
|
1992 |
11 |
5 |
p. 492- 1 p. |
artikel |
20 |
Great Chicago flood of '92: IS groups stay high and dry
|
Booker, Ellis |
|
1992 |
11 |
5 |
p. 486- 1 p. |
artikel |
21 |
Hackers and virus writers-are they outlaws or heroes?
|
|
|
1992 |
11 |
5 |
p. 489- 1 p. |
artikel |
22 |
IFIP TC11 news
|
Highland, Harold Joseph |
|
1992 |
11 |
5 |
p. 441-442 2 p. |
artikel |
23 |
IFIP technical committee 11
|
|
|
1992 |
11 |
5 |
p. 481-483 3 p. |
artikel |
24 |
It's C.Y.A. time
|
King, Julia |
|
1992 |
11 |
5 |
p. 491- 1 p. |
artikel |
25 |
IT security evaluation manual-the current status
|
|
|
1992 |
11 |
5 |
p. 492- 1 p. |
artikel |
26 |
Letter to the editor
|
Zajac, Bernard P. |
|
1992 |
11 |
5 |
p. 439-440 2 p. |
artikel |
27 |
New disk strategies remove security risks
|
Ferelli, Mark |
|
1992 |
11 |
5 |
p. 490- 1 p. |
artikel |
28 |
NSA approves CD-ROM encryption
|
|
|
1992 |
11 |
5 |
p. 487- 1 p. |
artikel |
29 |
PC security issues
|
Norman, Geoff |
|
1992 |
11 |
5 |
p. 412-416 5 p. |
artikel |
30 |
Police crack major hacker ring
|
|
|
1992 |
11 |
5 |
p. 485- 1 p. |
artikel |
31 |
Power protection plays a vital role in network security
|
Janusz, Cheryl |
|
1992 |
11 |
5 |
p. 490- 1 p. |
artikel |
32 |
Putting a stop to software piracy
|
Withers, Lucia |
|
1992 |
11 |
5 |
p. 490-491 2 p. |
artikel |
33 |
RACIF security goals comment on a paper by R. Paans
|
Lawrence, L.G. |
|
1992 |
11 |
5 |
p. 407-411 5 p. |
artikel |
34 |
Rain sickens data centre
|
|
|
1992 |
11 |
5 |
p. 488- 1 p. |
artikel |
35 |
Random bits & bytes
|
Harold Joseph Highland, |
|
1992 |
11 |
5 |
p. 390-406 17 p. |
artikel |
36 |
Refereed articles International board of referees
|
|
|
1992 |
11 |
5 |
p. 443- 1 p. |
artikel |
37 |
Requirements for cryptographic hash functions
|
Bauspiess, Fritz |
|
1992 |
11 |
5 |
p. 427-437 11 p. |
artikel |
38 |
Retinal scanners eye-dentify inmates
|
Booker, Ellis |
|
1992 |
11 |
5 |
p. 491- 1 p. |
artikel |
39 |
Security and technology: A better mousetrap
|
Miyoshi, Dennis |
|
1992 |
11 |
5 |
p. 491- 1 p. |
artikel |
40 |
Security aspects of wireless local area networks
|
Lathrop, David L. |
|
1992 |
11 |
5 |
p. 421-426 6 p. |
artikel |
41 |
Sprint, telematic fight phone Fraud
|
Horwitt, Elisabeth |
|
1992 |
11 |
5 |
p. 489-490 2 p. |
artikel |
42 |
The lessons of the Great Chicago flood of 1992
|
Menkus, Belden |
|
1992 |
11 |
5 |
p. 417-420 4 p. |
artikel |
43 |
To catch a “crimoid”
|
North, Sandra |
|
1992 |
11 |
5 |
p. 490- 1 p. |
artikel |
44 |
Typeface vendors gang up on pirates
|
Smith, Tony |
|
1992 |
11 |
5 |
p. 488- 1 p. |
artikel |
45 |
US banks can buy cover against computer crime
|
Moeller, Mike |
|
1992 |
11 |
5 |
p. 488-489 2 p. |
artikel |
46 |
Viral mind games
|
|
|
1992 |
11 |
5 |
p. 489- 1 p. |
artikel |
47 |
Viruses-here to stay
|
|
|
1992 |
11 |
5 |
p. 489- 1 p. |
artikel |
48 |
Viruses infect 37 computers
|
|
|
1992 |
11 |
5 |
p. 488- 1 p. |
artikel |
49 |
Virus-proof your PC
|
Taylor, Wendy |
|
1992 |
11 |
5 |
p. 490- 1 p. |
artikel |
50 |
Wake up: The cold war is over
|
Berman, Jerry |
|
1992 |
11 |
5 |
p. 485-486 2 p. |
artikel |
51 |
Yet another machine to break DES
|
McLaughlin, Robert |
|
1992 |
11 |
5 |
p. 492- 1 p. |
artikel |