nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1986 |
5 |
4 |
p. 350-359 10 p. |
artikel |
2 |
Advanced microcomputer security system
|
|
|
1986 |
5 |
4 |
p. 285-287 3 p. |
artikel |
3 |
A human approach to the technological challenges in data security
|
Alagar, V.S. |
|
1986 |
5 |
4 |
p. 328-335 8 p. |
artikel |
4 |
Another view about passwords
|
|
|
1986 |
5 |
4 |
p. 279-281 3 p. |
artikel |
5 |
A survey of issues in computer network security
|
Rutledge, Linda S. |
|
1986 |
5 |
4 |
p. 296-308 13 p. |
artikel |
6 |
Authentication and discretionary access control in computer networks
|
Karger, Paul A. |
|
1986 |
5 |
4 |
p. 314-324 11 p. |
artikel |
7 |
Author index to volume 5
|
|
|
1986 |
5 |
4 |
p. 367-368 2 p. |
artikel |
8 |
Calendar
|
|
|
1986 |
5 |
4 |
p. 363-364 2 p. |
artikel |
9 |
Computer crime investigation and investigators
|
Stanley, Philip M. |
|
1986 |
5 |
4 |
p. 309-313 5 p. |
artikel |
10 |
Data security in terminalized system
|
Ekebrink, Ivan |
|
1986 |
5 |
4 |
p. 325-327 3 p. |
artikel |
11 |
Detection of control deterioration using decision support systems
|
Tener, William T. |
|
1986 |
5 |
4 |
p. 290-295 6 p. |
artikel |
12 |
Electronic record systems and individual privacy
|
|
|
1986 |
5 |
4 |
p. 361-362 2 p. |
artikel |
13 |
Host cryptographic operations: A software implementation
|
Erdem, Hilmi |
|
1986 |
5 |
4 |
p. 344-346 3 p. |
artikel |
14 |
How to modify a microcomputer operating system for added security
|
Highland, Harold Joseph |
|
1986 |
5 |
4 |
p. 340-343 4 p. |
artikel |
15 |
International information integrity institute
|
|
|
1986 |
5 |
4 |
p. 287- 1 p. |
artikel |
16 |
In this issue …
|
Highland, HaroldJoseph |
|
1986 |
5 |
4 |
p. 277-278 2 p. |
artikel |
17 |
Privacy and progress
|
Leahy, Patrick |
|
1986 |
5 |
4 |
p. 347-349 3 p. |
artikel |
18 |
Protection of information in electronic systems
|
|
|
1986 |
5 |
4 |
p. 360- 1 p. |
artikel |
19 |
RAM-resident program security threat
|
|
|
1986 |
5 |
4 |
p. 282-285 4 p. |
artikel |
20 |
Remember the Enigma!
|
|
|
1986 |
5 |
4 |
p. 288-289 2 p. |
artikel |
21 |
Secure software's impact on reliability
|
Murine, Gerald E. |
|
1986 |
5 |
4 |
p. 336-339 4 p. |
artikel |
22 |
Subject index to volume 5
|
|
|
1986 |
5 |
4 |
p. 365-366 2 p. |
artikel |
23 |
The DES revisited
|
|
|
1986 |
5 |
4 |
p. 281-282 2 p. |
artikel |
24 |
The lure of large numbers
|
|
|
1986 |
5 |
4 |
p. 287- 1 p. |
artikel |