nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1983 |
2 |
3 |
p. 286-296 11 p. |
artikel |
2 |
A conceptual methodology for evaluating security requirements for data assets
|
Fry, Brian G.P. |
|
1983 |
2 |
3 |
p. 237-241 5 p. |
artikel |
3 |
An informational theory of security
|
Bottom Jr., Norman R. |
|
1983 |
2 |
3 |
p. 275-280 6 p. |
artikel |
4 |
Author index to volume 2
|
|
|
1983 |
2 |
3 |
p. 309- 1 p. |
artikel |
5 |
Calendar
|
|
|
1983 |
2 |
3 |
p. 301-304 4 p. |
artikel |
6 |
Computer security: An overview of national concern and challenge
|
|
|
1983 |
2 |
3 |
p. 299-300 2 p. |
artikel |
7 |
Decision support for risk analysis
|
Carroll, John M. |
|
1983 |
2 |
3 |
p. 230-236 7 p. |
artikel |
8 |
Editorial
|
Highland, Harold Joseph |
|
1983 |
2 |
3 |
p. 213- 1 p. |
artikel |
9 |
Enhancing information security with the information resource management approach
|
Wood, Charles Cresson |
|
1983 |
2 |
3 |
p. 223-229 7 p. |
artikel |
10 |
Implementing an integrated test facility audit using differential files
|
Koch, Harvey S |
|
1983 |
2 |
3 |
p. 242-247 6 p. |
artikel |
11 |
New members of the International Board of Editors
|
|
|
1983 |
2 |
3 |
p. 214-217 4 p. |
artikel |
12 |
News from IFIP TC-11
|
|
|
1983 |
2 |
3 |
p. 281-282 2 p. |
artikel |
13 |
Nine steps to effective EDP loss control
|
|
|
1983 |
2 |
3 |
p. 299- 1 p. |
artikel |
14 |
Professional organizations in computer security
|
|
|
1983 |
2 |
3 |
p. 283-285 3 p. |
artikel |
15 |
Protecting information in the electronic workplace: A guide for managers
|
|
|
1983 |
2 |
3 |
p. 299- 1 p. |
artikel |
16 |
Protecting your microcomputer system
|
|
|
1983 |
2 |
3 |
p. 298- 1 p. |
artikel |
17 |
Requirements for a secure terminal switch
|
Sorkin, Arthur |
|
1983 |
2 |
3 |
p. 268-274 7 p. |
artikel |
18 |
Security, IFIP/sec '83
|
|
|
1983 |
2 |
3 |
p. 297-298 2 p. |
artikel |
19 |
Security manual
|
|
|
1983 |
2 |
3 |
p. 300- 1 p. |
artikel |
20 |
Selection process for security packages
|
Eloff, Jan H.P. |
|
1983 |
2 |
3 |
p. 256-260 5 p. |
artikel |
21 |
Subject index to volume 2
|
|
|
1983 |
2 |
3 |
p. 305-308 4 p. |
artikel |
22 |
Teaching protection in computing: A research-oriented graduate course
|
Hartson, H.Rex |
|
1983 |
2 |
3 |
p. 248-255 8 p. |
artikel |
23 |
The design of complete encryption networks using cryptographically equivalent permutations
|
Ayoub, F. |
|
1983 |
2 |
3 |
p. 261-267 7 p. |
artikel |
24 |
The state-of-the-art in computer security
|
Lobel, Jerome |
|
1983 |
2 |
3 |
p. 218-222 5 p. |
artikel |