nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1985 |
4 |
2 |
p. 175-181 7 p. |
artikel |
2 |
Calendar
|
|
|
1985 |
4 |
2 |
p. 183-184 2 p. |
artikel |
3 |
Editorial
|
Highland, Harold Joseph |
|
1985 |
4 |
2 |
p. 101-102 2 p. |
artikel |
4 |
IFIP technical committee 11 members
|
|
|
1985 |
4 |
2 |
p. 153-159 7 p. |
artikel |
5 |
Incorporating access control in forms systems
|
Yeo, Gee Kin |
|
1985 |
4 |
2 |
p. 109-122 14 p. |
artikel |
6 |
Microcomputer security: Data protection techniques
|
Highland, Harold Joseph |
|
1985 |
4 |
2 |
p. 123-134 12 p. |
artikel |
7 |
Minutes from the first meeting of TC 11, security and protection in information processing systems
|
Hoving, PerL. |
|
1985 |
4 |
2 |
p. 149-152 4 p. |
artikel |
8 |
Professional organizations in computer security
|
|
|
1985 |
4 |
2 |
p. 173-174 2 p. |
artikel |
9 |
Professional responsibility for information privacy
|
Auerbach, Isaac L. |
|
1985 |
4 |
2 |
p. 103-107 5 p. |
artikel |
10 |
Second international congress on computer security
|
|
|
1985 |
4 |
2 |
p. 161-171 11 p. |
artikel |
11 |
The development of a specification language for a computer security system
|
Eloff, Jan H.P. |
|
1985 |
4 |
2 |
p. 143-147 5 p. |
artikel |
12 |
The EDP auditor's role in computer security
|
Menkus, Belden |
|
1985 |
4 |
2 |
p. 135-138 4 p. |
artikel |
13 |
Transaction controls: Steps to take after the equipment has been secured
|
Miller, James E. |
|
1985 |
4 |
2 |
p. 139-141 3 p. |
artikel |