nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
Collinson, Helen |
|
1994 |
13 |
3 |
p. 221-225 5 p. |
artikel |
2 |
Applied cryptography: Protocols, algorithms, and source code in C
|
Zajac Jr., Bernard P. |
|
1994 |
13 |
3 |
p. 217-218 2 p. |
artikel |
3 |
A scheme to determine the relationship between two users in a hierarchy
|
Chang, C.C. |
|
1994 |
13 |
3 |
p. 255-261 7 p. |
artikel |
4 |
Calendar
|
|
|
1994 |
13 |
3 |
p. 226-227 2 p. |
artikel |
5 |
Commonsense computer security — Your practical guide to information protection - 2nd edition
|
Zajac Jr., Bernard P. |
|
1994 |
13 |
3 |
p. 218- 1 p. |
artikel |
6 |
Fifty ways to secure dial-up connections
|
Wood, Charles Cresson |
|
1994 |
13 |
3 |
p. 209-215 7 p. |
artikel |
7 |
From the editor
|
|
|
1994 |
13 |
3 |
p. 190-191 2 p. |
artikel |
8 |
Guide for authors
|
|
|
1994 |
13 |
3 |
p. 274- 1 p. |
artikel |
9 |
High-level language computer viruses— a new threat?
|
Magruder, Scott |
|
1994 |
13 |
3 |
p. 263-269 7 p. |
artikel |
10 |
Identity authentication in heterogeneous computing environments: a comparative study for an integrated framework
|
Kanungo, Shivraj |
|
1994 |
13 |
3 |
p. 231-253 23 p. |
artikel |
11 |
IFIP technical committee 11
|
|
|
1994 |
13 |
3 |
p. 270-272 3 p. |
artikel |
12 |
Information security policies made easy
|
Zajac Jr., Bernard P. |
|
1994 |
13 |
3 |
p. 218-219 2 p. |
artikel |
13 |
International board of referees
|
|
|
1994 |
13 |
3 |
p. 229- 1 p. |
artikel |
14 |
Random bits & bytes
|
Highland,, HaroldJoseph |
|
1994 |
13 |
3 |
p. 192-205 14 p. |
artikel |
15 |
What do we mean by integrity?
|
Courtney, Robert H. |
|
1994 |
13 |
3 |
p. 206-208 3 p. |
artikel |