nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1993 |
12 |
6 |
p. 556-560 5 p. |
artikel |
2 |
A comparative framework for risk analysis methods
|
Eloff, J.H.P. |
|
1993 |
12 |
6 |
p. 597-603 7 p. |
artikel |
3 |
Calendar
|
|
|
1993 |
12 |
6 |
p. 561-562 2 p. |
artikel |
4 |
Computer viruses — Towards better solutions
|
Kensey, Michael F. |
|
1993 |
12 |
6 |
p. 536-541 6 p. |
artikel |
5 |
Duress terminations and information security
|
Cresson Wood, Charles |
|
1993 |
12 |
6 |
p. 527-535 9 p. |
artikel |
6 |
From the editor
|
|
|
1993 |
12 |
6 |
p. 516-517 2 p. |
artikel |
7 |
Guide for authors
|
|
|
1993 |
12 |
6 |
p. 608- 1 p. |
artikel |
8 |
IFIP/Sec '93 conference report
|
Joseph Highland, Harold |
|
1993 |
12 |
6 |
p. 550-555 6 p. |
artikel |
9 |
IFIP Technical Committee 11
|
|
|
1993 |
12 |
6 |
p. 605-607 3 p. |
artikel |
10 |
Operating system protection through program evolution
|
Cohen, Frederick B. |
|
1993 |
12 |
6 |
p. 565-584 20 p. |
artikel |
11 |
Paradigms for verification of authorization at source of electronic documents in an integrated environment
|
Russell, Selwyn |
|
1993 |
12 |
6 |
p. 542-549 8 p. |
artikel |
12 |
Random bits & bytes
|
Joseph Highland, Harold |
|
1993 |
12 |
6 |
p. 518-526 9 p. |
artikel |
13 |
Refereed papers
|
|
|
1993 |
12 |
6 |
p. 563- 1 p. |
artikel |
14 |
Software forensics: Can we track code to its authors?
|
Spafford, Eugene H. |
|
1993 |
12 |
6 |
p. 585-595 11 p. |
artikel |