Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             87 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Access control systems: from host-centric to net-work centric computing 1996
15 5 p. 402-
1 p.
artikel
2 An attack detection systems for secure computer systems — Design of the ADS 1996
15 5 p. 395-
1 p.
artikel
3 An hierarchical threshold scheme with unique partial keys 1996
15 5 p. 393-
1 p.
artikel
4 A policy for sending secret information over communications networks 1996
15 5 p. 400-
1 p.
artikel
5 Approach to object security in Distributed SOM 1996
15 5 p. 402-
1 p.
artikel
6 A practical framework for secure corporate teleworking 1996
15 5 p. 410-
1 p.
artikel
7 Ask stupid questions; Listen for the unsaid: the EDP auditor as consultant 1996
15 5 p. 409-
1 p.
artikel
8 A taxonomy for analyzing hazards to information systems 1996
15 5 p. 395-
1 p.
artikel
9 Authenticating passwords over an insecure channel Tzong-Chen, Wu
1996
15 5 p. 431-439
9 p.
artikel
10 Beware of a macro virus epidemic 1996
15 5 p. 398-
1 p.
artikel
11 Blaming the victim 1996
15 5 p. 418-
1 p.
artikel
12 Blind date — problems with the year 2000 1996
15 5 p. 418-
1 p.
artikel
13 Business continuity planning 1996
15 5 p. 411-
1 p.
artikel
14 Calender 1996
15 5 p. 403-404
2 p.
artikel
15 Cashless cybercrime 1996
15 5 p. 414-
1 p.
artikel
16 CIPFA survey of IT audit in UK public service organizations 1996 1996
15 5 p. 413-
1 p.
artikel
17 Closing the loopholes in host-based authentication 1996
15 5 p. 414-
1 p.
artikel
18 COMPSEC '96 exhibitors 1996
15 5 p. 419-420
2 p.
artikel
19 Computer evidence: an overview of forensic procedures, tools and techniques 1996
15 5 p. 417-
1 p.
artikel
20 Computer security in China Heinlein, Edwin B.
1996
15 5 p. 369-375
7 p.
artikel
21 Cooperating security managers: Distributed intrusion detection systems White, Gregory
1996
15 5 p. 441-450
10 p.
artikel
22 Corporate governance & IT 1996
15 5 p. 406-
1 p.
artikel
23 Countering chip theft 1996
15 5 p. 410-
1 p.
artikel
24 Cryptographic key distribution and authentication protocols for secure group communication 1996
15 5 p. 396-
1 p.
artikel
25 Crypto system initialization: Simplifying the distribution of initial keys 1996
15 5 p. 406-
1 p.
artikel
26 Danger! Deadly new computer viruses want to kill your PC 1996
15 5 p. 400-
1 p.
artikel
27 Dealing with a unix system penetration 1996
15 5 p. 409-410
2 p.
artikel
28 Disaster recovery: The people issues 1996
15 5 p. 411-
1 p.
artikel
29 Distributed registration and key distribution (DiRK) 1996
15 5 p. 394-395
2 p.
artikel
30 Does Microsoft have security all locked up? 1996
15 5 p. 399-
1 p.
artikel
31 Doing business on the Internet: marketing and security aspects 1996
15 5 p. 400-
1 p.
artikel
32 Efficient and probably secure key agreement 1996
15 5 p. 394-
1 p.
artikel
33 Electronic communications risk management: A checklist for business managers Moulton, Rolf T.
1996
15 5 p. 377-386
10 p.
artikel
34 Elite panel slams US crypto policy 1996
15 5 p. 397-
1 p.
artikel
35 Factors in the selection of a risk assessment method 1996
15 5 p. 401-
1 p.
artikel
36 Feds turn blind eye to systems security 1996
15 5 p. 401-
1 p.
artikel
37 From the editor 1996
15 5 p. 354-355
2 p.
artikel
38 Fundamental DES design concepts 1996
15 5 p. 406-
1 p.
artikel
39 GSSP (Generally-Accepted system Security Principles): A trip to abilene 1996
15 5 p. 417-
1 p.
artikel
40 IFIP/SEC'96 conference proceeding 1996
15 5 p. 393-
1 p.
artikel
41 IFIP TC 11 news Highland, Dr.Harold Joseph
1996
15 5 p. 387-390
4 p.
artikel
42 IFIP technical committee 11 1996
15 5 p. 451-453
3 p.
artikel
43 In defence of MoD IT privatization 1996
15 5 p. 399-
1 p.
artikel
44 Industry to Clinton: drop encryption policy 1996
15 5 p. 397-398
2 p.
artikel
45 Information owners, custodians and users 1996
15 5 p. 401-
1 p.
artikel
46 Information warfare: Your company needs you! 1996
15 5 p. 414-
1 p.
artikel
47 Intelligent security reporting — auditing security logs 1996
15 5 p. 417-418
2 p.
artikel
48 Intention modelling: Approximating computer user intentions for detection and prediction of intrusions 1996
15 5 p. 395-
1 p.
artikel
49 International Board of referees 1996
15 5 p. 429-430
2 p.
artikel
50 Internet security — firewall horror stories 1996
15 5 p. 405-
1 p.
artikel
51 Internet = Virusnet? 1996
15 5 p. 406-
1 p.
artikel
52 Internetwork access control using public key certificates 1996
15 5 p. 394-
1 p.
artikel
53 Intranet as an audit resource 1996
15 5 p. 413-
1 p.
artikel
54 Intranet security 1996
15 5 p. 405-
1 p.
artikel
55 Is encryption the road to security? 1996
15 5 p. 401-
1 p.
artikel
56 IT security and privacy education 1996
15 5 p. 395-396
2 p.
artikel
57 IT security is a business issue not a technical one 1996
15 5 p. 411-
1 p.
artikel
58 It's the Infrastructure, stupid 1996
15 5 p. 413-
1 p.
artikel
59 Keeping it legit 1996
15 5 p. 399-
1 p.
artikel
60 Mobile state — challenges for the 21st century 1996
15 5 p. 413-
1 p.
artikel
61 MoFAC: A model for fine-grained access control 1996
15 5 p. 395-
1 p.
artikel
62 Net porn prosecutions would be a ‘nightmare’ Meyer, Helen
1996
15 5 p. 397-
1 p.
artikel
63 Network disaster contingency planning 1996
15 5 p. 411-
1 p.
artikel
64 One company's roadmap to securing it's intranet 1996
15 5 p. 414-
1 p.
artikel
65 Password master 1996
15 5 p. 397-
1 p.
artikel
66 Practical application of high level risk analysis and security healthchecks for telecommunications systems 1996
15 5 p. 410-
1 p.
artikel
67 Privacy and the internet 1996
15 5 p. 398-
1 p.
artikel
68 Random bits & bytes Highland, Harold Joseph
1996
15 5 p. 356-366
11 p.
artikel
69 Reviewing and assessing IT projects under development 1996
15 5 p. 409-
1 p.
artikel
70 Right sizing without capsizing 1996
15 5 p. 409-
1 p.
artikel
71 SALSA: A method for developing the enterprise security architecture and strategy 1996
15 5 p. 406-
1 p.
artikel
72 SAP — Control and fraud prevention strategies 1996
15 5 p. 411-
1 p.
artikel
73 Secure IP access at last with virtual TCP Online 1996
15 5 p. 399-
1 p.
artikel
74 Securely executing multilevel transactions 1996
15 5 p. 394-
1 p.
artikel
75 Securing remote access to corporate systems 1996
15 5 p. 414-
1 p.
artikel
76 Security issues in the virtual corporation 1996
15 5 p. 405-406
2 p.
artikel
77 Security profile for interconnected open distributed systems with varying vulnerability 1996
15 5 p. 396-
1 p.
artikel
78 Smartcards — is Britain smart enough 1996
15 5 p. 417-
1 p.
artikel
79 Software quality assurance: The underlying framework for achieving secure and reliable software systems 1996
15 5 p. 394-
1 p.
artikel
80 Some observations on vulnerabilities 1996
15 5 p. 405-
1 p.
artikel
81 Tales from the crypt 1996
15 5 p. 400-
1 p.
artikel
82 Telecommunications fraud the evolving threat 1996
15 5 p. 410-
1 p.
artikel
83 Testing your plan is more important than the plan itself 1996
15 5 p. 400-
1 p.
artikel
84 The new information security age — electronic commerce & trusted third parties 1996
15 5 p. 409-
1 p.
artikel
85 The secret war 1996
15 5 p. 398-399
2 p.
artikel
86 The truth behind single sign-on 1996
15 5 p. 417-
1 p.
artikel
87 Web server: security lockdown 1996
15 5 p. 401-402
2 p.
artikel
                             87 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland