nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1984 |
3 |
4 |
p. 328-341 14 p. |
artikel |
2 |
A topology for secure MVS systems
|
Paans, R. |
|
1984 |
3 |
4 |
p. 278-285 8 p. |
artikel |
3 |
Author index to volume 3
|
|
|
1984 |
3 |
4 |
p. 350-351 2 p. |
artikel |
4 |
Calendar
|
|
|
1984 |
3 |
4 |
p. 342-345 4 p. |
artikel |
5 |
Computer security and EDP-auditing: The twin guards
|
Paans, Ronald |
|
1984 |
3 |
4 |
p. 259-261 3 p. |
artikel |
6 |
Crypto '84
|
|
|
1984 |
3 |
4 |
p. 324-325 2 p. |
artikel |
7 |
Data protection aspects in an integrated hospital information system
|
Louwerse, C.P. |
|
1984 |
3 |
4 |
p. 286-294 9 p. |
artikel |
8 |
ECOMA-12 European computer measurement association conference
|
Paans, Ronald |
|
1984 |
3 |
4 |
p. 323-324 2 p. |
artikel |
9 |
Editorial
|
Highland, Harold Joseph |
|
1984 |
3 |
4 |
p. 257- 1 p. |
artikel |
10 |
Effects of technical developments on system security
|
van de Goor, A.J. |
|
1984 |
3 |
4 |
p. 314-322 9 p. |
artikel |
11 |
IBM's data security strategy: Some implementation aspects
|
Buurmeijer, F. |
|
1984 |
3 |
4 |
p. 273-277 5 p. |
artikel |
12 |
Infinite confidence: ‘The audit of data communication networks’
|
Toppen, R. |
|
1984 |
3 |
4 |
p. 303-313 11 p. |
artikel |
13 |
In Memoriam
|
|
|
1984 |
3 |
4 |
p. 253-255 3 p. |
artikel |
14 |
Security in distributed data sharing systems
|
|
|
1984 |
3 |
4 |
p. 325-327 3 p. |
artikel |
15 |
Subject index to volume 3
|
|
|
1984 |
3 |
4 |
p. 346-349 4 p. |
artikel |
16 |
The burglar's viewpoint
|
van Hoboken, W.R.C. |
|
1984 |
3 |
4 |
p. 295-302 8 p. |
artikel |
17 |
The programmer's threat: Cases and causes
|
Herschberg, I.S. |
|
1984 |
3 |
4 |
p. 263-272 10 p. |
artikel |