nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving inter-operable security services in open systems products
|
Smith, Paul |
|
1995 |
14 |
5 |
p. 420- 1 p. |
artikel |
2 |
A fast method for cryptanalysis of substitution ciphers
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 414- 1 p. |
artikel |
3 |
AI techniques to counter financial fraud
|
Galliers, Kevin |
|
1995 |
14 |
5 |
p. 426- 1 p. |
artikel |
4 |
A job for security counsel
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 411-412 2 p. |
artikel |
5 |
A new perspective on firewall security
|
Schultz, Eugene |
|
1995 |
14 |
5 |
p. 417- 1 p. |
artikel |
6 |
An international perspective on IT security
|
Vince, Judith |
|
1995 |
14 |
5 |
p. 423- 1 p. |
artikel |
7 |
Applications of smartcards for anonymous and verifiable databases
|
Hardjono, Thomas |
|
1995 |
14 |
5 |
p. 465-472 8 p. |
artikel |
8 |
Are suppliers infected with an apathy virus?
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 412- 1 p. |
artikel |
9 |
Auditing and accounting: Usage and requirements
|
Hughes, John |
|
1995 |
14 |
5 |
p. 427- 1 p. |
artikel |
10 |
Automated audit — Tools & techniques
|
Crocker, Norman |
|
1995 |
14 |
5 |
p. 423-424 2 p. |
artikel |
11 |
Banks, vendors focus on security
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 409-410 2 p. |
artikel |
12 |
Beyond the code of practice: New challenges
|
Hickson, Nigel |
|
1995 |
14 |
5 |
p. 426- 1 p. |
artikel |
13 |
Business continuity planning
|
Sherwood, John |
|
1995 |
14 |
5 |
p. 423- 1 p. |
artikel |
14 |
Calendar
|
|
|
1995 |
14 |
5 |
p. 415-416 2 p. |
artikel |
15 |
CD-ROM security issues
|
Newman, Peter |
|
1995 |
14 |
5 |
p. 422- 1 p. |
artikel |
16 |
China's raids on software pirates move to interior
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 411- 1 p. |
artikel |
17 |
Client server — Promises, problems and solutions
|
Corum, P.J. |
|
1995 |
14 |
5 |
p. 422- 1 p. |
artikel |
18 |
Controlling digital signature services using a smartcard
|
Holloway, Chris |
|
1995 |
14 |
5 |
p. 419- 1 p. |
artikel |
19 |
Controlling the usage of cryptographic keys
|
Holloway, Chris |
|
1995 |
14 |
5 |
p. 419- 1 p. |
artikel |
20 |
Controls in the next millennium: Anticipating the IT-enabled future
|
Krull, Alan |
|
1995 |
14 |
5 |
p. 418- 1 p. |
artikel |
21 |
Cryptic cross words
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 413- 1 p. |
artikel |
22 |
Cryptography and the global information infrastructure
|
McNulty, Lynn |
|
1995 |
14 |
5 |
p. 420- 1 p. |
artikel |
23 |
Crypto system initialization: Simplifying the distribution of initial keys
|
Meyer, Carl |
|
1995 |
14 |
5 |
p. 419- 1 p. |
artikel |
24 |
Current developments in open systems security
|
Poole, Vernon |
|
1995 |
14 |
5 |
p. 420- 1 p. |
artikel |
25 |
Data protection in the information superhighway era
|
France, Elizabeth |
|
1995 |
14 |
5 |
p. 424- 1 p. |
artikel |
26 |
Deficiencies of the traditional approach to information security and the requirements for a new methodology
|
Hitchings, Jean |
|
1995 |
14 |
5 |
p. 377-383 7 p. |
artikel |
27 |
Derivatives and assessing their risks
|
Bolton, Andrew |
|
1995 |
14 |
5 |
p. 426- 1 p. |
artikel |
28 |
Design of a neural network for recognition and classification of computer viruses
|
Doumas, Anastasia |
|
1995 |
14 |
5 |
p. 435-448 14 p. |
artikel |
29 |
Developing legal risks in multimedia
|
Kelman, Alistair |
|
1995 |
14 |
5 |
p. 422-423 2 p. |
artikel |
30 |
Dial thru' fraud the ramifications for a business
|
Mulhall, Tom |
|
1995 |
14 |
5 |
p. 422- 1 p. |
artikel |
31 |
Dial-up and remote access facilities for LANs
|
Hancock, Bill |
|
1995 |
14 |
5 |
p. 424- 1 p. |
artikel |
32 |
Direct debiting: a case of serious fraud
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 410- 1 p. |
artikel |
33 |
Dynamic authentication for smartcards
|
John Leach, |
|
1995 |
14 |
5 |
p. 385-389 5 p. |
artikel |
34 |
EDI security and the internet
|
Dosdale, Terry |
|
1995 |
14 |
5 |
p. 426- 1 p. |
artikel |
35 |
Evaluation of Windows 95 and Windows NT security controls and architecture
|
Curtis, Mark |
|
1995 |
14 |
5 |
p. 426- 1 p. |
artikel |
36 |
Exhibitors
|
|
|
1995 |
14 |
5 |
p. 429-432 4 p. |
artikel |
37 |
Facing the challenge of IT security
|
Smith, Martin |
|
1995 |
14 |
5 |
p. 423- 1 p. |
artikel |
38 |
From the editor
|
|
|
1995 |
14 |
5 |
p. 362-363 2 p. |
artikel |
39 |
Future of internet security
|
Hancock, Bill |
|
1995 |
14 |
5 |
p. 417- 1 p. |
artikel |
40 |
Gaping holes of solicitors and accountants
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 410-411 2 p. |
artikel |
41 |
Hacker, awaiting trial, attends DefCon
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 409- 1 p. |
artikel |
42 |
Hackers crack BSykB code
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 409- 1 p. |
artikel |
43 |
Holes in the net
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 413- 1 p. |
artikel |
44 |
IFIP TC 11 news
|
Harold Joseph Highland, |
|
1995 |
14 |
5 |
p. 405-406 2 p. |
artikel |
45 |
IFIP Technical Committee 11
|
|
|
1995 |
14 |
5 |
p. 473-475 3 p. |
artikel |
46 |
Internal vs. external IT audits — or — Mapping out a war zone?
|
Farmer, Doc |
|
1995 |
14 |
5 |
p. 419-420 2 p. |
artikel |
47 |
International Board of Referees
|
|
|
1995 |
14 |
5 |
p. 433-434 2 p. |
artikel |
48 |
Internet tools for auditors
|
Oliphant, Alan |
|
1995 |
14 |
5 |
p. 424- 1 p. |
artikel |
49 |
Is security an issue? Then a BBS may be for you
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 413-414 2 p. |
artikel |
50 |
IT security — An implementation strategy
|
Parkin, Rod |
|
1995 |
14 |
5 |
p. 423- 1 p. |
artikel |
51 |
Letter to the editor
|
|
|
1995 |
14 |
5 |
p. 373-375 3 p. |
artikel |
52 |
Marketing information systems audit
|
Krull, Alan |
|
1995 |
14 |
5 |
p. 423- 1 p. |
artikel |
53 |
Microsoft tackles Win 95 pirates
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 412- 1 p. |
artikel |
54 |
MVS/SMF audit trail processing
|
Crocker, Norman |
|
1995 |
14 |
5 |
p. 420- 1 p. |
artikel |
55 |
New operating systems and old viruses
|
Hruska, Jan |
|
1995 |
14 |
5 |
p. 419- 1 p. |
artikel |
56 |
Novell security
|
Milsom, Chris |
|
1995 |
14 |
5 |
p. 424- 1 p. |
artikel |
57 |
Object oriented: Another silver bullet
|
Corum, P.J. |
|
1995 |
14 |
5 |
p. 426- 1 p. |
artikel |
58 |
Open systems security: Traps and pitfalls
|
Reid, Jim |
|
1995 |
14 |
5 |
p. 420- 1 p. |
artikel |
59 |
OS/2 security
|
Cogle, Graham |
|
1995 |
14 |
5 |
p. 424- 1 p. |
artikel |
60 |
Outsourcing — Ensuring security compliance
|
Tanner, Ray |
|
1995 |
14 |
5 |
p. 418- 1 p. |
artikel |
61 |
Physical layer network security: What your LAN can do for you
|
Banes, David |
|
1995 |
14 |
5 |
p. 422- 1 p. |
artikel |
62 |
Police break CD pirate ring in Cambridge
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 411- 1 p. |
artikel |
63 |
Project Satan
|
Venema, Wietse |
|
1995 |
14 |
5 |
p. 417-418 2 p. |
artikel |
64 |
Providing a safety net
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 413- 1 p. |
artikel |
65 |
Pssst, what's password again?
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 412- 1 p. |
artikel |
66 |
Publication of vulnerabilities and tools
|
Gordon, Sarah |
|
1995 |
14 |
5 |
p. 417- 1 p. |
artikel |
67 |
RAMeX: a prototype expert system for computer security risk analysis and management
|
Kailay, Muninder P. |
|
1995 |
14 |
5 |
p. 449-463 15 p. |
artikel |
68 |
Random bits & bytes
|
Joseph Highland, Harold |
|
1995 |
14 |
5 |
p. 365-371 7 p. |
artikel |
69 |
Role based access control
|
Parker, Tom |
|
1995 |
14 |
5 |
p. 418- 1 p. |
artikel |
70 |
Secure commercial servers
|
Watts, Clive |
|
1995 |
14 |
5 |
p. 426- 1 p. |
artikel |
71 |
Securing access and privacy on the internet
|
Madsen, Wayne |
|
1995 |
14 |
5 |
p. 418- 1 p. |
artikel |
72 |
Security implications of network infrastructure migration
|
Wood, Peter |
|
1995 |
14 |
5 |
p. 424- 1 p. |
artikel |
73 |
Security issues in contemporary banking
|
Osborne, Keith |
|
1995 |
14 |
5 |
p. 426- 1 p. |
artikel |
74 |
Smart cards and biometrics: An overview of current technologies, threats and opportunities
|
Bovelander, Ernst |
|
1995 |
14 |
5 |
p. 418-419 2 p. |
artikel |
75 |
Social engineering — Recognizing intruders
|
Gordon, Sarah |
|
1995 |
14 |
5 |
p. 424- 1 p. |
artikel |
76 |
Software Piracy — An Update
|
Webster, Geoffrey |
|
1995 |
14 |
5 |
p. 418- 1 p. |
artikel |
77 |
Standards — The need for a common framework
|
Hardy, Gary |
|
1995 |
14 |
5 |
p. 426-427 2 p. |
artikel |
78 |
Strong theoretical stenography
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 414- 1 p. |
artikel |
79 |
Technologically enabled crime: Shifting paradigms for the Year 2000
|
Gordon, Sarah |
|
1995 |
14 |
5 |
p. 391-402 12 p. |
artikel |
80 |
The changing rises associated with computer systems as reflected by disaster recovery experience
|
Taylor, Frank |
|
1995 |
14 |
5 |
p. 423- 1 p. |
artikel |
81 |
The impact of ATM on security in the data network
|
Hanson, Lesley |
|
1995 |
14 |
5 |
p. 422- 1 p. |
artikel |
82 |
The spook solution — Now open for business
|
Buckwell, Mark |
|
1995 |
14 |
5 |
p. 420- 1 p. |
artikel |
83 |
US approaches to cryptographic key escrowing (session presentation)
|
McNulty, Lynn |
|
1995 |
14 |
5 |
p. 426- 1 p. |
artikel |
84 |
Using firewalls to provide secure internet access
|
Sherwood, John |
|
1995 |
14 |
5 |
p. 417- 1 p. |
artikel |
85 |
Value added system development auditing
|
Mitchell, John |
|
1995 |
14 |
5 |
p. 419- 1 p. |
artikel |
86 |
Viruses, an overestimated threat?
|
Brunnstein, Prof.Klaus |
|
1995 |
14 |
5 |
p. 419- 1 p. |
artikel |
87 |
White House seeks copyright protection for text, software published online
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 411- 1 p. |
artikel |
88 |
Why the bad guys are winning
|
Schultz, Eugene |
|
1995 |
14 |
5 |
p. 427- 1 p. |
artikel |
89 |
Why waste money on disaster recovery
|
Hiles, Andrew |
|
1995 |
14 |
5 |
p. 423- 1 p. |
artikel |
90 |
Wireless network security
|
Wood, Charles Cresson |
|
1995 |
14 |
5 |
p. 422- 1 p. |
artikel |
91 |
Word is out on virus that attacks macros
|
Collinson, Helen |
|
1995 |
14 |
5 |
p. 412-413 2 p. |
artikel |
92 |
Writing infosec policies
|
Wood, Charles Cresson |
|
1995 |
14 |
5 |
p. 418- 1 p. |
artikel |
93 |
X.400 Security: Current and future usage
|
Hughes, John |
|
1995 |
14 |
5 |
p. 422- 1 p. |
artikel |