nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1987 |
6 |
2 |
p. 180-190 11 p. |
artikel |
2 |
Calendar
|
|
|
1987 |
6 |
2 |
p. 191-192 2 p. |
artikel |
3 |
Computer crime — numbers lie
|
Saari, Juhani |
|
1987 |
6 |
2 |
p. 111-117 7 p. |
artikel |
4 |
Computer security: A new focus at the National Bureau of Standards
|
Highland, HaroldJoseph |
|
1987 |
6 |
2 |
p. 102-103 2 p. |
artikel |
5 |
Cost-effectiveness modeling for a decision support system in computer security
|
Bui, Tung |
|
1987 |
6 |
2 |
p. 139-151 13 p. |
artikel |
6 |
ECOMA-14
|
Paans, Ronald |
|
1987 |
6 |
2 |
p. 172- 1 p. |
artikel |
7 |
First European Conference on Computer Audit, Control & Security
|
Paans, Ronald |
|
1987 |
6 |
2 |
p. 173-176 4 p. |
artikel |
8 |
How secure are your encryption keys?
|
Highland, HaroldJoseph |
|
1987 |
6 |
2 |
p. 99-100 2 p. |
artikel |
9 |
How security fits in — a management view
|
Schweitzer, James A. |
|
1987 |
6 |
2 |
p. 129-132 4 p. |
artikel |
10 |
IFIP/Sec'86: Information security: The challenge
|
Paans, Ronald |
|
1987 |
6 |
2 |
p. 167-171 5 p. |
artikel |
11 |
In this issue…
|
Highland, HaroldJoseph |
|
1987 |
6 |
2 |
p. 97-98 2 p. |
artikel |
12 |
Networks without user observability
|
Pfitzmann, Andreas |
|
1987 |
6 |
2 |
p. 158-166 9 p. |
artikel |
13 |
Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking
|
Lee, J.A.N. |
|
1987 |
6 |
2 |
p. 177-179 3 p. |
artikel |
14 |
Protection and administration of information networks with partial orderings
|
Cohe, Fred |
|
1987 |
6 |
2 |
p. 118-128 11 p. |
artikel |
15 |
Random notes and reports
|
Highland, HaroldJoseph |
|
1987 |
6 |
2 |
p. 109-110 2 p. |
artikel |
16 |
Technology watch
|
Highland, HaroldJoseph |
|
1987 |
6 |
2 |
p. 103-108 6 p. |
artikel |
17 |
The charade of computer security
|
Highland, HaroldJoseph |
|
1987 |
6 |
2 |
p. 108-109 2 p. |
artikel |
18 |
The DES revisited — Part II
|
Highland, HaroldJoseph |
|
1987 |
6 |
2 |
p. 100-101 2 p. |
artikel |
19 |
The hackers' comfort
|
Herschberg, I.S. |
|
1987 |
6 |
2 |
p. 133-138 6 p. |
artikel |
20 |
Verifying the authentication of an information system user
|
Ahituv, Niv |
|
1987 |
6 |
2 |
p. 152-157 6 p. |
artikel |