Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             52 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Financial Management Approach for Selecting Optimal, Cost-effective Safeguards Upgrades for Computer- and Information- Security Risk Management Highland, Harold Joseph
1995
14 1 p. 28-29
2 p.
artikel
2 A Pattern Matching Model for Misuse Intrusion Detection Highland, Harold Joseph
1995
14 1 p. 28-
1 p.
artikel
3 Architectures for C2 DOS/Windows-based Personal Computers — Securing an ‘Undesirable’ Operating System Highland, Harold Joseph
1995
14 1 p. 30-
1 p.
artikel
4 A recipe for hacker heartburn Collinson, Helen
1995
14 1 p. 39-
1 p.
artikel
5 Artificial Intelligence and Intrusion Detection: Current and Future Directions Highland, Harold Joseph
1995
14 1 p. 31-
1 p.
artikel
6 A Taxonomy for Security Standards Highland, Harold Joseph
1995
14 1 p. 30-
1 p.
artikel
7 Belief in Correctness Highland, Harold Joseph
1995
14 1 p. 27-28
2 p.
artikel
8 BSA cracks down on piracy in NZ Collinson, Helen
1995
14 1 p. 37-
1 p.
artikel
9 Business continuity planning Smith, Martin
1995
14 1 p. 14-23
10 p.
artikel
10 Calendar 1995
14 1 p. 40-41
2 p.
artikel
11 Can Computer Crime be Deterred Highland, Harold Joseph
1995
14 1 p. 28-
1 p.
artikel
12 Computer Security Centre to be set up Collinson, Helen
1995
14 1 p. 35-
1 p.
artikel
13 Cops of the dataway. Collinson, Helen
1995
14 1 p. 36-
1 p.
artikel
14 Copy protection, the sequel: coming to a PC near you Collinson, Helen
1995
14 1 p. 39-
1 p.
artikel
15 Crypto system battles video pirates Collinson, Helen
1995
14 1 p. 38-39
2 p.
artikel
16 CSIS watchdog finds possible breach of secrets in fighting high-tech crime. Collinson, Helen
1995
14 1 p. 37-
1 p.
artikel
17 Dial a Star? Utahn faces felony for accessing numbers Collinson, Helen
1995
14 1 p. 36-
1 p.
artikel
18 Editorial Board 1995
14 1 p. 2-
1 p.
artikel
19 Exporting Evaluation: An Analysis of US and Canadian Criteria for Trust Highland, Harold Joseph
1995
14 1 p. 31-
1 p.
artikel
20 From the editor 1995
14 1 p. 2-3
2 p.
artikel
21 Hackers take revenge on the author of new book on Cyberspace wars Collinson, Helen
1995
14 1 p. 35-
1 p.
artikel
22 Help: working smarter lock, stock and password Collinson, Helen
1995
14 1 p. 39-
1 p.
artikel
23 IFIP TC 11 news Highland, Harold Joseph
1995
14 1 p. 33-34
2 p.
artikel
24 IFIP Technical Committee 11 1995
14 1 p. 83-85
3 p.
artikel
25 Implementing Role Based, Clark-Wilson Enforcement Rules in a Bl Online Transaction Processing System Highland, Harold Joseph
1995
14 1 p. 29-
1 p.
artikel
26 International board of referees 1995
14 1 p. 43-
1 p.
artikel
27 Is anything safe anymore? Collinson, Helen
1995
14 1 p. 39-
1 p.
artikel
28 London Borough innocent victim of computer fraud. Collinson, Helen
1995
14 1 p. 36-37
2 p.
artikel
29 Minnesota teen nabbed in computer hacker case Collinson, Helen
1995
14 1 p. 36-
1 p.
artikel
30 Modern Multilevel Security (MLS): Practical Approaches for Integration, Certification and Accreditation Highland, Harold Joseph
1995
14 1 p. 31-32
2 p.
artikel
31 New thinking about information technology security Abrams, Marshall D.
1995
14 1 p. 69-81
13 p.
artikel
32 Partitioning the Security Analysis of Complex Systems Highland, Harold Joseph
1995
14 1 p. 30-
1 p.
artikel
33 Random bits & bytes Highland, Harold Joseph
1995
14 1 p. 4-13
10 p.
artikel
34 SCO patches Collinson, Helen
1995
14 1 p. 38-
1 p.
artikel
35 Secure EDI over the Internet Collinson, Helen
1995
14 1 p. 39-
1 p.
artikel
36 Security across the LAN Collinson, Helen
1995
14 1 p. 39-
1 p.
artikel
37 Security Awareness and the Persuasion of Mmanagers Highland, Harold Joseph
1995
14 1 p. 27-
1 p.
artikel
38 Support for Security in Distributed Systems Using Messiahs Highland, Harold Joseph
1995
14 1 p. 30-
1 p.
artikel
39 Testing Intrusion Detection Systems: Design Methodologies and Results from an Early Prototype Highland, Harold Joseph
1995
14 1 p. 28-
1 p.
artikel
40 The Electronic Intrusion Threat to National Security & Emergency Preparedness Telecommunications: An Awareness Document Highland, Harold Joseph
1995
14 1 p. 30-31
2 p.
artikel
41 The Electronic wallet: secure payment methods sought for Internet Collinson, Helen
1995
14 1 p. 36-
1 p.
artikel
42 The RSA Security Conference 1995 Heinlein, Edwin B.
1995
14 1 p. 24-26
3 p.
artikel
43 The Sea View Prototype: Project Summary Highland, Harold Joseph
1995
14 1 p. 29-
1 p.
artikel
44 Towards a Formal Verification of a Secure and Distributed System and its Applications Highland, Harold Joseph
1995
14 1 p. 29-
1 p.
artikel
45 Trusted computing update Abrams, Marshall D.
1995
14 1 p. 57-68
12 p.
artikel
46 Trusted system concepts Abrams, Marshall D.
1995
14 1 p. 45-56
12 p.
artikel
47 Using Application Profiles to Detect Computer Misuse Highland, Harold Joseph
1995
14 1 p. 27-
1 p.
artikel
48 US rattles a sabre at Chinese pirates Collinson, Helen
1995
14 1 p. 37-38
2 p.
artikel
49 Virtual View Model to Design a Secure Object-Oriented Database Highland, Harold Joseph
1995
14 1 p. 31-
1 p.
artikel
50 What Color is Your Assurance? Highland, Harold Joseph
1995
14 1 p. 28-
1 p.
artikel
51 Will Privacy vanish along with wires? Collinson, Helen
1995
14 1 p. 37-
1 p.
artikel
52 World Institute for Security Enhancement Collinson, Helen
1995
14 1 p. 38-
1 p.
artikel
                             52 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland