Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             22 results found
no title author magazine year volume issue page(s) type
1 Abstracts of recent articles and literature 1983
2 1 p. 88-96
9 p.
article
2 Advances in computer system security H, HJ
1983
2 1 p. 84-
1 p.
article
3 Calendar 1983
2 1 p. 97-98
2 p.
article
4 CBEMA privacy and security bibliography (October 1982) H, HJ
1983
2 1 p. 83-
1 p.
article
5 Codes, ciphers and computers: An introduction to information security H, HJ
1983
2 1 p. 83-84
2 p.
article
6 Computer crime and its prevention Goldstein, Bruce
1983
2 1 p. 63-66
4 p.
article
7 Computer security: Observations on the state of the technology Murray, William H.
1983
2 1 p. 16-23
8 p.
article
8 Controlling cryptographic publication Weingarten, F.
1983
2 1 p. 41-48
8 p.
article
9 Data communications controls Cerullo, Michael J.
1983
2 1 p. 67-72
6 p.
article
10 Editorial Highland, Harold Joseph
1983
2 1 p. 1-2
2 p.
article
11 Editorial Board 1983
2 1 p. IFC-
1 p.
article
12 Effective information system security with password controls Wood, Charles Cresson
1983
2 1 p. 5-10
6 p.
article
13 EFTS impact on computer security Guynes, Steve
1983
2 1 p. 73-77
5 p.
article
14 Methodology for security analysis of data-processing systems Caroll, John M.
1983
2 1 p. 24-34
11 p.
article
15 Notes on terrorism and data processing Menkus, Belden
1983
2 1 p. 11-15
5 p.
article
16 Securing the distributed word processing network Callaghan, David R.
1983
2 1 p. 78-81
4 p.
article
17 The hut six story: Breaking the Enigma codes H, HJ
1983
2 1 p. 82-83
2 p.
article
18 The Office of Technology Assessment reports 1983
2 1 p. 85-87
3 p.
article
19 Three new members of the International Board of Editors 1983
2 1 p. 3-4
2 p.
article
20 Towards a new approach to secure database design Bussolati, U.
1983
2 1 p. 49-62
14 p.
article
21 Tutorial: The security of data in networks H, HJ
1983
2 1 p. 84-
1 p.
article
22 Unique approach to security evaluation Backwith, Nigel
1983
2 1 p. 35-40
6 p.
article
                             22 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands