Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abstracts of recent articles and literature 1986
5 2 p. 150-164
15 p.
artikel
2 A pauper's callback scheme Bishop, Matt
1986
5 2 p. 141-144
4 p.
artikel
3 Authentication in a heterogeneous environment Power, JuneM.
1986
5 2 p. 167-
1 p.
artikel
4 “Back door” trespassing 1986
5 2 p. 94-
1 p.
artikel
5 Calendar 1986
5 2 p. 177-178
2 p.
artikel
6 Computer security — Prevention: Lessons from the operation of a nuclear power plant Hoebeke, L.
1986
5 2 p. 122-127
6 p.
artikel
7 Concepts of protection in the IFIP WG 2.7 reference model for command and response languages Kugler, Han-Jürgen
1986
5 2 p. 168-
1 p.
artikel
8 CRYPTO '85 1986
5 2 p. 170-176
7 p.
artikel
9 Data security in a relational database environment van der Lans, R.F.
1986
5 2 p. 128-134
7 p.
artikel
10 Decision support systems - A necessity for effective auditing of controls Tener, WilliamT.
1986
5 2 p. 168-
1 p.
artikel
11 Design of a secure relational data base Carroll, JohnM.
1986
5 2 p. 167-
1 p.
artikel
12 Development and organization of the audit and security functions Beatson, JohnG.
1986
5 2 p. 168-
1 p.
artikel
13 Educating computer crime investigators Stanley, PhilipM.
1986
5 2 p. 168-169
2 p.
artikel
14 Electromagnetic radiation revisited Highland, Harold Joseph
1986
5 2 p. 85-93
9 p.
artikel
15 Emerging privacy issues Ware, Willis H.
1986
5 2 p. 101-113
13 p.
artikel
16 Emerging privacy issues Ware, WillisH.
1986
5 2 p. 167-
1 p.
artikel
17 Establishing technical systems security standards at a large multinational bank Wood, CharlesCresson
1986
5 2 p. 169-
1 p.
artikel
18 How to use the DES safely Davies, DonaldW.
1986
5 2 p. 169-
1 p.
artikel
19 IBM dynamic signature verification Worthington, T.K.
1986
5 2 p. 167-168
2 p.
artikel
20 Intergrating security activities into the software development life cycle and the software quality assurance process Tompkins, FrederickG.
1986
5 2 p. 167-
1 p.
artikel
21 In this issue… Highland, HaroldJoseph
1986
5 2 p. 83-
1 p.
artikel
22 New member of the International Board of Editors Essen, Johan
1986
5 2 p. 84-
1 p.
artikel
23 On a serious (?) note 1986
5 2 p. 99-
1 p.
artikel
24 On cryptographic protection of capabilities 1986
5 2 p. 98-99
2 p.
artikel
25 On the key storage requirements for secure terminals Jansen, C.J.A.
1986
5 2 p. 145-149
5 p.
artikel
26 Producing reliable, secure software Murine, GeraldE.
1986
5 2 p. 169-
1 p.
artikel
27 Risk management — a key to security in the electronic funds transfer system Richards, Roy Martin
1986
5 2 p. 135-140
6 p.
artikel
28 Security for small business computers Kingston, PeterP.C.H.
1986
5 2 p. 168-
1 p.
artikel
29 Security modules: Potent information security system components Wood, Charles Cresson
1986
5 2 p. 114-121
8 p.
artikel
30 Security of electronic transactions Ekerbrink, Ivan
1986
5 2 p. 168-
1 p.
artikel
31 Security reminders 1986
5 2 p. 97-98
2 p.
artikel
32 Software versus hardware encryption - Is there any difference today? Fåk, Viiveke
1986
5 2 p. 167-
1 p.
artikel
33 Some suggested reading 1986
5 2 p. 97-
1 p.
artikel
34 Technology watch 1986
5 2 p. 94-97
4 p.
artikel
35 The audit, control and security of the project life cycle - Pre-implementation stage Doswell, RogerT.
1986
5 2 p. 168-
1 p.
artikel
36 WG 11:4 status report 1986
5 2 p. 165-166
2 p.
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland