nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1987 |
6 |
1 |
p. 80-90 11 p. |
artikel |
2 |
Authentication in a heterogeneous environment
|
Power, June M. |
|
1987 |
6 |
1 |
p. 41-48 8 p. |
artikel |
3 |
Calendar
|
|
|
1987 |
6 |
1 |
p. 95-96 2 p. |
artikel |
4 |
Computer-related embezzlement
|
Solarz, Artur |
|
1987 |
6 |
1 |
p. 49-53 5 p. |
artikel |
5 |
Computer viruses
|
Cohen, Fred |
|
1987 |
6 |
1 |
p. 22-35 14 p. |
artikel |
6 |
Computer viruses and sudden death!
|
Highland, HaroldJoseph |
|
1987 |
6 |
1 |
p. 8-10 3 p. |
artikel |
7 |
Crypto management made manageable — Demands on crypto equipment design
|
Fåk, Viiveke |
|
1987 |
6 |
1 |
p. 36-40 5 p. |
artikel |
8 |
Data physician — A virus protection program
|
Highland, HaroldJoseph |
|
1987 |
6 |
1 |
p. 73-79 7 p. |
artikel |
9 |
DOS postscript
|
|
|
1987 |
6 |
1 |
p. 15-16 2 p. |
artikel |
10 |
Editorial Board
|
|
|
1987 |
6 |
1 |
p. IFC- 1 p. |
artikel |
11 |
Electromagnetic eavesdropping — Fact of fantasy?
|
|
|
1987 |
6 |
1 |
p. 12-14 3 p. |
artikel |
12 |
Expert systems applied to the analysis of key management schemes
|
Longley, Dennis |
|
1987 |
6 |
1 |
p. 54-67 14 p. |
artikel |
13 |
How to supervise and control I/S Security Officers and Auditors
|
Moulton, Rolf T. |
|
1987 |
6 |
1 |
p. 17-21 5 p. |
artikel |
14 |
IFIP/Sec
|
|
|
1987 |
6 |
1 |
p. 12- 1 p. |
artikel |
15 |
In this issue…
|
Highland, Harold Joseph |
|
1987 |
6 |
1 |
p. 1-3 3 p. |
artikel |
16 |
New members of the International Board of Editors
|
|
|
1987 |
6 |
1 |
p. 4-7 4 p. |
artikel |
17 |
Other meetings of note
|
|
|
1987 |
6 |
1 |
p. 14- 1 p. |
artikel |
18 |
Report about TC 11 working groups
|
|
|
1987 |
6 |
1 |
p. 14- 1 p. |
artikel |
19 |
Second European Conference on Computer Audit, Control & Security
|
|
|
1987 |
6 |
1 |
p. 94- 1 p. |
artikel |
20 |
Security for microcomputers used in small business
|
Kingston, Peter P.C.H. |
|
1987 |
6 |
1 |
p. 68-72 5 p. |
artikel |
21 |
Security reminder
|
|
|
1987 |
6 |
1 |
p. 15- 1 p. |
artikel |
22 |
System Security 1986
|
|
|
1987 |
6 |
1 |
p. 91-93 3 p. |
artikel |
23 |
Technology watch — Personal authentication devices
|
|
|
1987 |
6 |
1 |
p. 10-11 2 p. |
artikel |