nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1986 |
5 |
3 |
p. 257-272 16 p. |
artikel |
2 |
Approaches to handling “Trojan Horse” threats
|
Lapid, Yeheskel |
|
1986 |
5 |
3 |
p. 251-256 6 p. |
artikel |
3 |
Authentication: A concise survey
|
Pluimakers, G.M.J. |
|
1986 |
5 |
3 |
p. 243-250 8 p. |
artikel |
4 |
Calendar
|
|
|
1986 |
5 |
3 |
p. 273-275 3 p. |
artikel |
5 |
Coffee break
|
|
|
1986 |
5 |
3 |
p. 190- 1 p. |
artikel |
6 |
Electromagnetic radiation revisited, part II
|
Highland, HaroldJoseph |
|
1986 |
5 |
3 |
p. 181-184 4 p. |
artikel |
7 |
Establishing internal technical systems security standards
|
Wood, Charles Cresson |
|
1986 |
5 |
3 |
p. 193-200 8 p. |
artikel |
8 |
Hard disk disaster recovery tool
|
|
|
1986 |
5 |
3 |
p. 190-192 3 p. |
artikel |
9 |
In brief…
|
|
|
1986 |
5 |
3 |
p. 187-188 2 p. |
artikel |
10 |
Insuring computer risks
|
Richards, Roy Martin |
|
1986 |
5 |
3 |
p. 207-210 4 p. |
artikel |
11 |
Integrating security activities into the software development life cycle and the software quality assurance process
|
Tompkins, Frederick G. |
|
1986 |
5 |
3 |
p. 218-242 25 p. |
artikel |
12 |
In this issue …
|
Highland, HaroldJoseph |
|
1986 |
5 |
3 |
p. 179-180 2 p. |
artikel |
13 |
Managing the EDP audit and security functions
|
Beatson, John G. |
|
1986 |
5 |
3 |
p. 201-206 6 p. |
artikel |
14 |
Microcomputer access control limited by password, time, day, and/or program
|
|
|
1986 |
5 |
3 |
p. 185-186 2 p. |
artikel |
15 |
Microcomputer audit trails made easy
|
|
|
1986 |
5 |
3 |
p. 188-189 2 p. |
artikel |
16 |
Modern technology tools for user authentication
|
|
|
1986 |
5 |
3 |
p. 184-185 2 p. |
artikel |
17 |
Risk analysis package
|
|
|
1986 |
5 |
3 |
p. 189-190 2 p. |
artikel |
18 |
Societal vulnerability to computer system failures
|
Hoffman, Lance J. |
|
1986 |
5 |
3 |
p. 211-217 7 p. |
artikel |