Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             64 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A common criteria framework for the evaluation of information technology systems security 1997
16 3 p. 207-
1 p.
artikel
2 A comparison of schemes for certification authorities/trusted third parties 1997
16 3 p. 210-
1 p.
artikel
3 A compile-time model for safe information flow in object-oriented databases 1997
16 3 p. 206-
1 p.
artikel
4 A comprehensive need-to-know access control system and its application for medical information systems 1997
16 3 p. 209-
1 p.
artikel
5 A formal model to aid documenting and harmonizing of information security requirements 1997
16 3 p. 205-206
2 p.
artikel
6 Analysis Meyer, Helen
1997
16 3 p. 216-
1 p.
artikel
7 An attack detection system for secure computer systems-outline of the solution 1997
16 3 p. 207-
1 p.
artikel
8 A taxonomy of electronic case schemes 1997
16 3 p. 208-
1 p.
artikel
9 Authorship analysis: identifying the author of a program Krsul, Ivan
1997
16 3 p. 233-257
25 p.
artikel
10 Banks fear net losses Meyer, Helen
1997
16 3 p. 216-217
2 p.
artikel
11 Calender 1997
16 3 p. 219-220
2 p.
artikel
12 Can security baselines replace risk analysis? 1997
16 3 p. 206-207
2 p.
artikel
13 Code of practice: a standard for information security management 1997
16 3 p. 206-
1 p.
artikel
14 Computer disasters: prevention and recovery 1997
16 3 p. 187-188
2 p.
artikel
15 Confessing to the FBI Meyer, Helen
1997
16 3 p. 213-
1 p.
artikel
16 Constructing computer virus phylogenies 1997
16 3 p. 187-
1 p.
artikel
17 Controlling internet access at an educational institution 1997
16 3 p. 210-
1 p.
artikel
18 Data backup technology 1997
16 3 p. 188-
1 p.
artikel
19 Deriving authorization from process analysis in legacy information systems 1997
16 3 p. 206-
1 p.
artikel
20 Driving safely on the information highway Meyer, Helen
1997
16 3 p. 214-215
2 p.
artikel
21 Electronic borders: Defining and protecting national networks Molini, James E.
1997
16 3 p. 189-196
8 p.
artikel
22 Five rules for selling security Meyer, Helen
1997
16 3 p. 216-
1 p.
artikel
23 From the editor 1997
16 3 p. 178-179
2 p.
artikel
24 Hacker's brother changes his grades Meyer, Helen
1997
16 3 p. 214-
1 p.
artikel
25 Hackers hit AOL cybervirgins Meyer, Helen
1997
16 3 p. 213-214
2 p.
artikel
26 How to trust systems 1997
16 3 p. 210-
1 p.
artikel
27 Identity thieves place credit ratings at risk Meyer, Helen
1997
16 3 p. 213-
1 p.
artikel
28 IFIP/SEC'97 conference proceedings Highland, Harold Joseph
1997
16 3 p. 205-
1 p.
artikel
29 IFIP TC 11 news Highland, Dr.Harold Joseph
1997
16 3 p. 211-212
2 p.
artikel
30 IFIP technical committee 11 1997
16 3 p. 259-261
3 p.
artikel
31 Integrating information security in the development of telematic systems 1997
16 3 p. 210-
1 p.
artikel
32 International Board of Referees 1997
16 3 p. 221-222
2 p.
artikel
33 Internet E-mail looks for security Meyer, Helen
1997
16 3 p. 215-
1 p.
artikel
34 Internet Explorer security flaws Meyer, Helen
1997
16 3 p. 217-
1 p.
artikel
35 Intruder alert Meyer, Helen
1997
16 3 p. 218-
1 p.
artikel
36 Labour to unlock encryption plans Meyer, Helen
1997
16 3 p. 214-
1 p.
artikel
37 Microsoft establishes security zones Meyer, Helen
1997
16 3 p. 215-
1 p.
artikel
38 New organizational forms for information security management 1997
16 3 p. 210-
1 p.
artikel
39 News scan Highland, Harold Joseph
1997
16 3 p. 180-181
2 p.
artikel
40 New vistas on info-system security 1997
16 3 p. 207-
1 p.
artikel
41 Non-intrusive authentication 1997
16 3 p. 209-
1 p.
artikel
42 NTIS volumes of interest Highland, Harold Joseph
1997
16 3 p. 187-
1 p.
artikel
43 Part of the foundation for secure systems: separation of duties policy Meyer, Helen
1997
16 3 p. 214-
1 p.
artikel
44 PGP is first to gain crypto approval Meyer, Helen
1997
16 3 p. 215-
1 p.
artikel
45 Pseudonymous audit for privacy enhanced intrusion detection 1997
16 3 p. 207-
1 p.
artikel
46 Public_key cryptosystems based on linear codes 1997
16 3 p. 187-
1 p.
artikel
47 Risk analysis: requirements, conflicts and problems Ciechanowicz, Zbigniew
1997
16 3 p. 223-232
10 p.
artikel
48 Roaming security agents enabling intelligent access control and network protection 1997
16 3 p. 209-210
2 p.
artikel
49 Secure communications now or later? Meyer, Helen
1997
16 3 p. 217-
1 p.
artikel
50 Secure VPNs Meyer, Helen
1997
16 3 p. 217-218
2 p.
artikel
51 Security in computing Highland, Harold Joseph
1997
16 3 p. 181-
1 p.
artikel
52 Security requirements and solution in distributed electronic health records 1997
16 3 p. 208-209
2 p.
artikel
53 Security when outsourcing: concepts, constructs, compliance 1997
16 3 p. 208-
1 p.
artikel
54 Singapore tops software piracy list, survey shows Meyer, Helen
1997
16 3 p. 214-
1 p.
artikel
55 Tackling network security can be an uphill battle Meyer, Helen
1997
16 3 p. 217-
1 p.
artikel
56 The future of networks and network security 1997
16 3 p. 209-
1 p.
artikel
57 Towards a holistic view of security and safety of enterprise information and communication technologies: adapting to a changing paradigm 1997
16 3 p. 208-
1 p.
artikel
58 Virus scanners for multiple OSes Highland, Harold Joseph
1997
16 3 p. 182-184
3 p.
artikel
59 Walking through the wall of fire Meyer, Helen
1997
16 3 p. 215-
1 p.
artikel
60 Web site directory Highland, Harold Joseph
1997
16 3 p. 186-187
2 p.
artikel
61 What are the information security risks in decision support systems and data warehousing? Finne, Thomas
1997
16 3 p. 197-204
8 p.
artikel
62 Whom do you trust? Meyer, Helen
1997
16 3 p. 215-
1 p.
artikel
63 Why I bought a Compaq Highland, Harold Joseph
1997
16 3 p. 184-186
3 p.
artikel
64 Year 2000 Highland, Harold Joseph
1997
16 3 p. 181-182
2 p.
artikel
                             64 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland