nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1985 |
4 |
1 |
p. 83-95 13 p. |
artikel |
2 |
A management view: computer security as a discretionary decision
|
Schweitzer, James A. |
|
1985 |
4 |
1 |
p. 13-22 10 p. |
artikel |
3 |
Calendar
|
|
|
1985 |
4 |
1 |
p. 97-99 3 p. |
artikel |
4 |
COSSAC: a framework for analyzing and configuring secure computer facilities
|
Carroll, John M. |
|
1985 |
4 |
1 |
p. 5-12 8 p. |
artikel |
5 |
Cryptographic equipment security: a code of practice
|
Serpell, Stephen C. |
|
1985 |
4 |
1 |
p. 47-64 18 p. |
artikel |
6 |
Data security and confidentiality
|
|
|
1985 |
4 |
1 |
p. 75-81 7 p. |
artikel |
7 |
Editorial
|
Highland, Harold Joseph |
|
1985 |
4 |
1 |
p. 1-2 2 p. |
artikel |
8 |
Editorial Board
|
|
|
1985 |
4 |
1 |
p. IFC- 1 p. |
artikel |
9 |
General controls in computer systems
|
Cerullo, Michael J. |
|
1985 |
4 |
1 |
p. 33-45 13 p. |
artikel |
10 |
New member of the International Board of Editors
|
|
|
1985 |
4 |
1 |
p. 3- 1 p. |
artikel |
11 |
Specification of internal accounting controls in a database environment
|
Gal, Graham |
|
1985 |
4 |
1 |
p. 23-32 10 p. |
artikel |
12 |
The first national computer security conference
|
Highland, Harold Joseph |
|
1985 |
4 |
1 |
p. 65-73 9 p. |
artikel |