Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             93 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Achieving inter-operable security services in open systems products Smith, Paul
1995
14 5 p. 420-
1 p.
artikel
2 A fast method for cryptanalysis of substitution ciphers Collinson, Helen
1995
14 5 p. 414-
1 p.
artikel
3 AI techniques to counter financial fraud Galliers, Kevin
1995
14 5 p. 426-
1 p.
artikel
4 A job for security counsel Collinson, Helen
1995
14 5 p. 411-412
2 p.
artikel
5 A new perspective on firewall security Schultz, Eugene
1995
14 5 p. 417-
1 p.
artikel
6 An international perspective on IT security Vince, Judith
1995
14 5 p. 423-
1 p.
artikel
7 Applications of smartcards for anonymous and verifiable databases Hardjono, Thomas
1995
14 5 p. 465-472
8 p.
artikel
8 Are suppliers infected with an apathy virus? Collinson, Helen
1995
14 5 p. 412-
1 p.
artikel
9 Auditing and accounting: Usage and requirements Hughes, John
1995
14 5 p. 427-
1 p.
artikel
10 Automated audit — Tools & techniques Crocker, Norman
1995
14 5 p. 423-424
2 p.
artikel
11 Banks, vendors focus on security Collinson, Helen
1995
14 5 p. 409-410
2 p.
artikel
12 Beyond the code of practice: New challenges Hickson, Nigel
1995
14 5 p. 426-
1 p.
artikel
13 Business continuity planning Sherwood, John
1995
14 5 p. 423-
1 p.
artikel
14 Calendar 1995
14 5 p. 415-416
2 p.
artikel
15 CD-ROM security issues Newman, Peter
1995
14 5 p. 422-
1 p.
artikel
16 China's raids on software pirates move to interior Collinson, Helen
1995
14 5 p. 411-
1 p.
artikel
17 Client server — Promises, problems and solutions Corum, P.J.
1995
14 5 p. 422-
1 p.
artikel
18 Controlling digital signature services using a smartcard Holloway, Chris
1995
14 5 p. 419-
1 p.
artikel
19 Controlling the usage of cryptographic keys Holloway, Chris
1995
14 5 p. 419-
1 p.
artikel
20 Controls in the next millennium: Anticipating the IT-enabled future Krull, Alan
1995
14 5 p. 418-
1 p.
artikel
21 Cryptic cross words Collinson, Helen
1995
14 5 p. 413-
1 p.
artikel
22 Cryptography and the global information infrastructure McNulty, Lynn
1995
14 5 p. 420-
1 p.
artikel
23 Crypto system initialization: Simplifying the distribution of initial keys Meyer, Carl
1995
14 5 p. 419-
1 p.
artikel
24 Current developments in open systems security Poole, Vernon
1995
14 5 p. 420-
1 p.
artikel
25 Data protection in the information superhighway era France, Elizabeth
1995
14 5 p. 424-
1 p.
artikel
26 Deficiencies of the traditional approach to information security and the requirements for a new methodology Hitchings, Jean
1995
14 5 p. 377-383
7 p.
artikel
27 Derivatives and assessing their risks Bolton, Andrew
1995
14 5 p. 426-
1 p.
artikel
28 Design of a neural network for recognition and classification of computer viruses Doumas, Anastasia
1995
14 5 p. 435-448
14 p.
artikel
29 Developing legal risks in multimedia Kelman, Alistair
1995
14 5 p. 422-423
2 p.
artikel
30 Dial thru' fraud the ramifications for a business Mulhall, Tom
1995
14 5 p. 422-
1 p.
artikel
31 Dial-up and remote access facilities for LANs Hancock, Bill
1995
14 5 p. 424-
1 p.
artikel
32 Direct debiting: a case of serious fraud Collinson, Helen
1995
14 5 p. 410-
1 p.
artikel
33 Dynamic authentication for smartcards John Leach,
1995
14 5 p. 385-389
5 p.
artikel
34 EDI security and the internet Dosdale, Terry
1995
14 5 p. 426-
1 p.
artikel
35 Evaluation of Windows 95 and Windows NT security controls and architecture Curtis, Mark
1995
14 5 p. 426-
1 p.
artikel
36 Exhibitors 1995
14 5 p. 429-432
4 p.
artikel
37 Facing the challenge of IT security Smith, Martin
1995
14 5 p. 423-
1 p.
artikel
38 From the editor 1995
14 5 p. 362-363
2 p.
artikel
39 Future of internet security Hancock, Bill
1995
14 5 p. 417-
1 p.
artikel
40 Gaping holes of solicitors and accountants Collinson, Helen
1995
14 5 p. 410-411
2 p.
artikel
41 Hacker, awaiting trial, attends DefCon Collinson, Helen
1995
14 5 p. 409-
1 p.
artikel
42 Hackers crack BSykB code Collinson, Helen
1995
14 5 p. 409-
1 p.
artikel
43 Holes in the net Collinson, Helen
1995
14 5 p. 413-
1 p.
artikel
44 IFIP TC 11 news Harold Joseph Highland,
1995
14 5 p. 405-406
2 p.
artikel
45 IFIP Technical Committee 11 1995
14 5 p. 473-475
3 p.
artikel
46 Internal vs. external IT audits — or — Mapping out a war zone? Farmer, Doc
1995
14 5 p. 419-420
2 p.
artikel
47 International Board of Referees 1995
14 5 p. 433-434
2 p.
artikel
48 Internet tools for auditors Oliphant, Alan
1995
14 5 p. 424-
1 p.
artikel
49 Is security an issue? Then a BBS may be for you Collinson, Helen
1995
14 5 p. 413-414
2 p.
artikel
50 IT security — An implementation strategy Parkin, Rod
1995
14 5 p. 423-
1 p.
artikel
51 Letter to the editor 1995
14 5 p. 373-375
3 p.
artikel
52 Marketing information systems audit Krull, Alan
1995
14 5 p. 423-
1 p.
artikel
53 Microsoft tackles Win 95 pirates Collinson, Helen
1995
14 5 p. 412-
1 p.
artikel
54 MVS/SMF audit trail processing Crocker, Norman
1995
14 5 p. 420-
1 p.
artikel
55 New operating systems and old viruses Hruska, Jan
1995
14 5 p. 419-
1 p.
artikel
56 Novell security Milsom, Chris
1995
14 5 p. 424-
1 p.
artikel
57 Object oriented: Another silver bullet Corum, P.J.
1995
14 5 p. 426-
1 p.
artikel
58 Open systems security: Traps and pitfalls Reid, Jim
1995
14 5 p. 420-
1 p.
artikel
59 OS/2 security Cogle, Graham
1995
14 5 p. 424-
1 p.
artikel
60 Outsourcing — Ensuring security compliance Tanner, Ray
1995
14 5 p. 418-
1 p.
artikel
61 Physical layer network security: What your LAN can do for you Banes, David
1995
14 5 p. 422-
1 p.
artikel
62 Police break CD pirate ring in Cambridge Collinson, Helen
1995
14 5 p. 411-
1 p.
artikel
63 Project Satan Venema, Wietse
1995
14 5 p. 417-418
2 p.
artikel
64 Providing a safety net Collinson, Helen
1995
14 5 p. 413-
1 p.
artikel
65 Pssst, what's password again? Collinson, Helen
1995
14 5 p. 412-
1 p.
artikel
66 Publication of vulnerabilities and tools Gordon, Sarah
1995
14 5 p. 417-
1 p.
artikel
67 RAMeX: a prototype expert system for computer security risk analysis and management Kailay, Muninder P.
1995
14 5 p. 449-463
15 p.
artikel
68 Random bits & bytes Joseph Highland, Harold
1995
14 5 p. 365-371
7 p.
artikel
69 Role based access control Parker, Tom
1995
14 5 p. 418-
1 p.
artikel
70 Secure commercial servers Watts, Clive
1995
14 5 p. 426-
1 p.
artikel
71 Securing access and privacy on the internet Madsen, Wayne
1995
14 5 p. 418-
1 p.
artikel
72 Security implications of network infrastructure migration Wood, Peter
1995
14 5 p. 424-
1 p.
artikel
73 Security issues in contemporary banking Osborne, Keith
1995
14 5 p. 426-
1 p.
artikel
74 Smart cards and biometrics: An overview of current technologies, threats and opportunities Bovelander, Ernst
1995
14 5 p. 418-419
2 p.
artikel
75 Social engineering — Recognizing intruders Gordon, Sarah
1995
14 5 p. 424-
1 p.
artikel
76 Software Piracy — An Update Webster, Geoffrey
1995
14 5 p. 418-
1 p.
artikel
77 Standards — The need for a common framework Hardy, Gary
1995
14 5 p. 426-427
2 p.
artikel
78 Strong theoretical stenography Collinson, Helen
1995
14 5 p. 414-
1 p.
artikel
79 Technologically enabled crime: Shifting paradigms for the Year 2000 Gordon, Sarah
1995
14 5 p. 391-402
12 p.
artikel
80 The changing rises associated with computer systems as reflected by disaster recovery experience Taylor, Frank
1995
14 5 p. 423-
1 p.
artikel
81 The impact of ATM on security in the data network Hanson, Lesley
1995
14 5 p. 422-
1 p.
artikel
82 The spook solution — Now open for business Buckwell, Mark
1995
14 5 p. 420-
1 p.
artikel
83 US approaches to cryptographic key escrowing (session presentation) McNulty, Lynn
1995
14 5 p. 426-
1 p.
artikel
84 Using firewalls to provide secure internet access Sherwood, John
1995
14 5 p. 417-
1 p.
artikel
85 Value added system development auditing Mitchell, John
1995
14 5 p. 419-
1 p.
artikel
86 Viruses, an overestimated threat? Brunnstein, Prof.Klaus
1995
14 5 p. 419-
1 p.
artikel
87 White House seeks copyright protection for text, software published online Collinson, Helen
1995
14 5 p. 411-
1 p.
artikel
88 Why the bad guys are winning Schultz, Eugene
1995
14 5 p. 427-
1 p.
artikel
89 Why waste money on disaster recovery Hiles, Andrew
1995
14 5 p. 423-
1 p.
artikel
90 Wireless network security Wood, Charles Cresson
1995
14 5 p. 422-
1 p.
artikel
91 Word is out on virus that attacks macros Collinson, Helen
1995
14 5 p. 412-413
2 p.
artikel
92 Writing infosec policies Wood, Charles Cresson
1995
14 5 p. 418-
1 p.
artikel
93 X.400 Security: Current and future usage Hughes, John
1995
14 5 p. 422-
1 p.
artikel
                             93 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland