nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Financial Management Approach for Selecting Optimal, Cost-effective Safeguards Upgrades for Computer- and Information- Security Risk Management
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 28-29 2 p. |
artikel |
2 |
A Pattern Matching Model for Misuse Intrusion Detection
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 28- 1 p. |
artikel |
3 |
Architectures for C2 DOS/Windows-based Personal Computers — Securing an ‘Undesirable’ Operating System
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 30- 1 p. |
artikel |
4 |
A recipe for hacker heartburn
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 39- 1 p. |
artikel |
5 |
Artificial Intelligence and Intrusion Detection: Current and Future Directions
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 31- 1 p. |
artikel |
6 |
A Taxonomy for Security Standards
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 30- 1 p. |
artikel |
7 |
Belief in Correctness
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 27-28 2 p. |
artikel |
8 |
BSA cracks down on piracy in NZ
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 37- 1 p. |
artikel |
9 |
Business continuity planning
|
Smith, Martin |
|
1995 |
14 |
1 |
p. 14-23 10 p. |
artikel |
10 |
Calendar
|
|
|
1995 |
14 |
1 |
p. 40-41 2 p. |
artikel |
11 |
Can Computer Crime be Deterred
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 28- 1 p. |
artikel |
12 |
Computer Security Centre to be set up
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 35- 1 p. |
artikel |
13 |
Cops of the dataway.
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 36- 1 p. |
artikel |
14 |
Copy protection, the sequel: coming to a PC near you
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 39- 1 p. |
artikel |
15 |
Crypto system battles video pirates
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 38-39 2 p. |
artikel |
16 |
CSIS watchdog finds possible breach of secrets in fighting high-tech crime.
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 37- 1 p. |
artikel |
17 |
Dial a Star? Utahn faces felony for accessing numbers
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 36- 1 p. |
artikel |
18 |
Editorial Board
|
|
|
1995 |
14 |
1 |
p. 2- 1 p. |
artikel |
19 |
Exporting Evaluation: An Analysis of US and Canadian Criteria for Trust
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 31- 1 p. |
artikel |
20 |
From the editor
|
|
|
1995 |
14 |
1 |
p. 2-3 2 p. |
artikel |
21 |
Hackers take revenge on the author of new book on Cyberspace wars
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 35- 1 p. |
artikel |
22 |
Help: working smarter lock, stock and password
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 39- 1 p. |
artikel |
23 |
IFIP TC 11 news
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 33-34 2 p. |
artikel |
24 |
IFIP Technical Committee 11
|
|
|
1995 |
14 |
1 |
p. 83-85 3 p. |
artikel |
25 |
Implementing Role Based, Clark-Wilson Enforcement Rules in a Bl Online Transaction Processing System
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 29- 1 p. |
artikel |
26 |
International board of referees
|
|
|
1995 |
14 |
1 |
p. 43- 1 p. |
artikel |
27 |
Is anything safe anymore?
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 39- 1 p. |
artikel |
28 |
London Borough innocent victim of computer fraud.
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 36-37 2 p. |
artikel |
29 |
Minnesota teen nabbed in computer hacker case
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 36- 1 p. |
artikel |
30 |
Modern Multilevel Security (MLS): Practical Approaches for Integration, Certification and Accreditation
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 31-32 2 p. |
artikel |
31 |
New thinking about information technology security
|
Abrams, Marshall D. |
|
1995 |
14 |
1 |
p. 69-81 13 p. |
artikel |
32 |
Partitioning the Security Analysis of Complex Systems
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 30- 1 p. |
artikel |
33 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 4-13 10 p. |
artikel |
34 |
SCO patches
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 38- 1 p. |
artikel |
35 |
Secure EDI over the Internet
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 39- 1 p. |
artikel |
36 |
Security across the LAN
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 39- 1 p. |
artikel |
37 |
Security Awareness and the Persuasion of Mmanagers
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 27- 1 p. |
artikel |
38 |
Support for Security in Distributed Systems Using Messiahs
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 30- 1 p. |
artikel |
39 |
Testing Intrusion Detection Systems: Design Methodologies and Results from an Early Prototype
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 28- 1 p. |
artikel |
40 |
The Electronic Intrusion Threat to National Security & Emergency Preparedness Telecommunications: An Awareness Document
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 30-31 2 p. |
artikel |
41 |
The Electronic wallet: secure payment methods sought for Internet
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 36- 1 p. |
artikel |
42 |
The RSA Security Conference 1995
|
Heinlein, Edwin B. |
|
1995 |
14 |
1 |
p. 24-26 3 p. |
artikel |
43 |
The Sea View Prototype: Project Summary
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 29- 1 p. |
artikel |
44 |
Towards a Formal Verification of a Secure and Distributed System and its Applications
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 29- 1 p. |
artikel |
45 |
Trusted computing update
|
Abrams, Marshall D. |
|
1995 |
14 |
1 |
p. 57-68 12 p. |
artikel |
46 |
Trusted system concepts
|
Abrams, Marshall D. |
|
1995 |
14 |
1 |
p. 45-56 12 p. |
artikel |
47 |
Using Application Profiles to Detect Computer Misuse
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 27- 1 p. |
artikel |
48 |
US rattles a sabre at Chinese pirates
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 37-38 2 p. |
artikel |
49 |
Virtual View Model to Design a Secure Object-Oriented Database
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 31- 1 p. |
artikel |
50 |
What Color is Your Assurance?
|
Highland, Harold Joseph |
|
1995 |
14 |
1 |
p. 28- 1 p. |
artikel |
51 |
Will Privacy vanish along with wires?
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 37- 1 p. |
artikel |
52 |
World Institute for Security Enhancement
|
Collinson, Helen |
|
1995 |
14 |
1 |
p. 38- 1 p. |
artikel |