nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1987 |
6 |
3 |
p. 269-281 13 p. |
artikel |
2 |
Calendar
|
|
|
1987 |
6 |
3 |
p. 282-283 2 p. |
artikel |
3 |
Cipher cracking
|
Highland, HaroldJoseph |
|
1987 |
6 |
3 |
p. 205- 1 p. |
artikel |
4 |
Computer security and law
|
Highland, HaroldJoseph |
|
1987 |
6 |
3 |
p. 203-205 3 p. |
artikel |
5 |
Data encryption standard II?
|
Highland, HaroldJoseph |
|
1987 |
6 |
3 |
p. 195-196 2 p. |
artikel |
6 |
Design and administration of distributed and hierarchical information networks under partial orderings
|
Cohen, Fred |
|
1987 |
6 |
3 |
p. 219-228 10 p. |
artikel |
7 |
Encryption package
|
Highland, HaroldJoseph |
|
1987 |
6 |
3 |
p. 199-202 4 p. |
artikel |
8 |
From the editor
|
Highland, Harold Joseph |
|
1987 |
6 |
3 |
p. 193-194 2 p. |
artikel |
9 |
How to evaluate microcomputer encryption software and hardware
|
Highland, Harold Joseph |
|
1987 |
6 |
3 |
p. 229-244 16 p. |
artikel |
10 |
Information sources
|
Highland, HaroldJoseph |
|
1987 |
6 |
3 |
p. 198-199 2 p. |
artikel |
11 |
Key updating flags in EFT-POS security systems
|
Johnstone, Richard J. |
|
1987 |
6 |
3 |
p. 252-260 9 p. |
artikel |
12 |
Multi-level security in database management systems
|
Dwyer, Patricia A. |
|
1987 |
6 |
3 |
p. 245-251 7 p. |
artikel |
13 |
Report from Beijing
|
Highland, HaroldJoseph |
|
1987 |
6 |
3 |
p. 196-198 3 p. |
artikel |
14 |
TeleTrusT-OSIS and communication security
|
Rihaczek, Karl |
|
1987 |
6 |
3 |
p. 206-218 13 p. |
artikel |
15 |
TRASEC: Belgian security system for electronic funds transfers
|
van Heurck, Ph. |
|
1987 |
6 |
3 |
p. 261-268 8 p. |
artikel |
16 |
US data controls
|
Highland, HaroldJoseph |
|
1987 |
6 |
3 |
p. 202-203 2 p. |
artikel |