nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
‘A false sense of security’
|
|
|
1992 |
11 |
8 |
p. 726- 1 p. |
artikel |
2 |
After Hurricane Andrew
|
|
|
1992 |
11 |
8 |
p. 725- 1 p. |
artikel |
3 |
A software authentication system for information integrity
|
Harn, Lein |
|
1992 |
11 |
8 |
p. 747-752 6 p. |
artikel |
4 |
A zero knowledge probabilistic login protocol
|
Gritzalis, Dimitris |
|
1992 |
11 |
8 |
p. 733-745 13 p. |
artikel |
5 |
Calendar
|
|
|
1992 |
11 |
8 |
p. 729- 1 p. |
artikel |
6 |
Case study: Boston TV station
|
|
|
1992 |
11 |
8 |
p. 724- 1 p. |
artikel |
7 |
Case study: Closing ‘windows’ against intruders
|
Hardy, Gary |
|
1992 |
11 |
8 |
p. 711-714 4 p. |
artikel |
8 |
DOS to add antivirus features
|
|
|
1992 |
11 |
8 |
p. 723-724 2 p. |
artikel |
9 |
Electronic underground
|
|
|
1992 |
11 |
8 |
p. 722- 1 p. |
artikel |
10 |
Evidence of market failure of UK's Computer Misuse Act?
|
|
|
1992 |
11 |
8 |
p. 723- 1 p. |
artikel |
11 |
French losses rise sharply
|
|
|
1992 |
11 |
8 |
p. 724- 1 p. |
artikel |
12 |
From the editor
|
|
|
1992 |
11 |
8 |
p. 680-681 2 p. |
artikel |
13 |
Guide for authors
|
|
|
1992 |
11 |
8 |
p. 768- 1 p. |
artikel |
14 |
Hackers demonstrate phone banking weakness
|
|
|
1992 |
11 |
8 |
p. 721- 1 p. |
artikel |
15 |
High-tech movie highlights realistic security concerns
|
|
|
1992 |
11 |
8 |
p. 727- 1 p. |
artikel |
16 |
How dangerous are simple virus toolkits?
|
|
|
1992 |
11 |
8 |
p. 726- 1 p. |
artikel |
17 |
IBM/DEC disaster recovery deal
|
|
|
1992 |
11 |
8 |
p. 725- 1 p. |
artikel |
18 |
IFIP TC 11 news
|
Highland, HaroldJoseph |
|
1992 |
11 |
8 |
p. 715-719 5 p. |
artikel |
19 |
IFIP technical committee 11
|
|
|
1992 |
11 |
8 |
p. 765-767 3 p. |
artikel |
20 |
International Board of Referees
|
|
|
1992 |
11 |
8 |
p. 731- 1 p. |
artikel |
21 |
Lattice-based enforcement of Chinese Walls
|
Sandhu, Ravi S. |
|
1992 |
11 |
8 |
p. 753-763 11 p. |
artikel |
22 |
Lax security at Drug Enforcement Administration
|
|
|
1992 |
11 |
8 |
p. 724- 1 p. |
artikel |
23 |
Leap in anti-virus vaccine
|
|
|
1992 |
11 |
8 |
p. 722- 1 p. |
artikel |
24 |
Letter to the editor
|
Anderson, Ross |
|
1992 |
11 |
8 |
p. 710- 1 p. |
artikel |
25 |
Management control and security
|
|
|
1992 |
11 |
8 |
p. 725- 1 p. |
artikel |
26 |
Novell users face threat to security
|
|
|
1992 |
11 |
8 |
p. 723- 1 p. |
artikel |
27 |
PC security theatened by new wave operating systems
|
|
|
1992 |
11 |
8 |
p. 722- 1 p. |
artikel |
28 |
Planned privacy law weakend
|
|
|
1992 |
11 |
8 |
p. 724- 1 p. |
artikel |
29 |
Project ideas fail to catch $18 million funding
|
|
|
1992 |
11 |
8 |
p. 724- 1 p. |
artikel |
30 |
Quantum cryptography
|
|
|
1992 |
11 |
8 |
p. 725- 1 p. |
artikel |
31 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1992 |
11 |
8 |
p. 682-694 13 p. |
artikel |
32 |
Recession puts firms on disaster tightrope
|
|
|
1992 |
11 |
8 |
p. 724- 1 p. |
artikel |
33 |
Re-examining the Data Encryption Standard
|
Menkus, Belden |
|
1992 |
11 |
8 |
p. 703-706 4 p. |
artikel |
34 |
Roles changed in downsized environment
|
|
|
1992 |
11 |
8 |
p. 722- 1 p. |
artikel |
35 |
Statistical confidentiality
|
|
|
1992 |
11 |
8 |
p. 726- 1 p. |
artikel |
36 |
Suppliers are biggest virus carriers
|
|
|
1992 |
11 |
8 |
p. 721- 1 p. |
artikel |
37 |
The importance of security standards
|
|
|
1992 |
11 |
8 |
p. 725-726 2 p. |
artikel |
38 |
The increasing risks of using e-mail
|
|
|
1992 |
11 |
8 |
p. 722-723 2 p. |
artikel |
39 |
The virtuous virus
|
|
|
1992 |
11 |
8 |
p. 725- 1 p. |
artikel |
40 |
Understanding VAX/VMS security
|
Whiting, Todd |
|
1992 |
11 |
8 |
p. 695-698 4 p. |
artikel |
41 |
University lecturer uses virus threat to blackmail
|
|
|
1992 |
11 |
8 |
p. 721- 1 p. |
artikel |
42 |
Update on open systems security
|
Black, George |
|
1992 |
11 |
8 |
p. 699-702 4 p. |
artikel |
43 |
User's guide to safe computing
|
|
|
1992 |
11 |
8 |
p. 727- 1 p. |
artikel |
44 |
US Justice Department ‘stole’ software
|
|
|
1992 |
11 |
8 |
p. 722- 1 p. |
artikel |
45 |
US pays dear for data loss
|
|
|
1992 |
11 |
8 |
p. 721- 1 p. |
artikel |
46 |
Viruses and anti-viruses in Israel
|
|
|
1992 |
11 |
8 |
p. 726-727 2 p. |
artikel |
47 |
Virus threat toned down
|
|
|
1992 |
11 |
8 |
p. 723- 1 p. |
artikel |
48 |
Who's on the line?
|
|
|
1992 |
11 |
8 |
p. 726- 1 p. |
artikel |
49 |
X.400 security
|
King, Judith |
|
1992 |
11 |
8 |
p. 707-710 4 p. |
artikel |