nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
Collinson, Helen |
|
1994 |
13 |
5 |
p. 401-406 6 p. |
artikel |
2 |
Calendar
|
|
|
1994 |
13 |
5 |
p. 407-408 2 p. |
artikel |
3 |
Cost effectiveness of anti-viral scanners
|
Zajac Jr., Bernard P. |
|
1994 |
13 |
5 |
p. 392-400 9 p. |
artikel |
4 |
Digital signatures and their uses
|
Ganley, Michael J |
|
1994 |
13 |
5 |
p. 385-391 7 p. |
artikel |
5 |
Discretionary access control by means of usage conditions
|
Born, Eike |
|
1994 |
13 |
5 |
p. 437-450 14 p. |
artikel |
6 |
From the editor
|
|
|
1994 |
13 |
5 |
p. 370-371 2 p. |
artikel |
7 |
Guide for authors
|
|
|
1994 |
13 |
5 |
p. 454- 1 p. |
artikel |
8 |
IFIP technical committee 11
|
|
|
1994 |
13 |
5 |
p. 451-453 3 p. |
artikel |
9 |
International board of referees
|
|
|
1994 |
13 |
5 |
p. 409- 1 p. |
artikel |
10 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1994 |
13 |
5 |
p. 372-378 7 p. |
artikel |
11 |
Security evaluation criteria
|
Strous, Leon |
|
1994 |
13 |
5 |
p. 379-384 6 p. |
artikel |
12 |
TOPM: a formal approach to the optimization of information technology risk management
|
Badenhorst, Karin P. |
|
1994 |
13 |
5 |
p. 411-435 25 p. |
artikel |