nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Addresses of publications
|
|
|
1988 |
7 |
1 |
p. 108-110 3 p. |
artikel |
2 |
After the street's unforgettable week all info systems are (mostly) go
|
Crockett, Barton |
|
1988 |
7 |
1 |
p. 107- 1 p. |
artikel |
3 |
Analysis of the encryption algorithm used in the wordperfect word processing program
|
Bennett, John |
|
1988 |
7 |
1 |
p. 105- 1 p. |
artikel |
4 |
Anatomy of a disaster
|
|
|
1988 |
7 |
1 |
p. 101- 1 p. |
artikel |
5 |
Another perspective on sensitive but unclassified data
|
Courtney Jr., Robert H. |
|
1988 |
7 |
1 |
p. 19-23 5 p. |
artikel |
6 |
Apple urges separate copyright registration of screen displays
|
|
|
1988 |
7 |
1 |
p. 101- 1 p. |
artikel |
7 |
A public-key cryptosystem based on language theory
|
Salomaa, Arto |
|
1988 |
7 |
1 |
p. 83-87 5 p. |
artikel |
8 |
Calendar
|
|
|
1988 |
7 |
1 |
p. 111- 1 p. |
artikel |
9 |
Case history of a virus attack
|
Highland, Harold Joseph |
|
1988 |
7 |
1 |
p. 3-5 3 p. |
artikel |
10 |
Chernobyl computer communications
|
Highland, Harold Joseph |
|
1988 |
7 |
1 |
p. 7-9 3 p. |
artikel |
11 |
Computer crime—What to do before it happens
|
|
|
1988 |
7 |
1 |
p. 102- 1 p. |
artikel |
12 |
Computer trouble makes British skies unfriendly
|
Hunter, Philip |
|
1988 |
7 |
1 |
p. 105- 1 p. |
artikel |
13 |
Data errors hurt state department system
|
Grimm, Vanessa Jo |
|
1988 |
7 |
1 |
p. 105-106 2 p. |
artikel |
14 |
Development of confidence limits by pivotal functions for estimating software reliability
|
|
|
1988 |
7 |
1 |
p. 107- 1 p. |
artikel |
15 |
Dial-up communication lines: Can they be secured?
|
Zajac Jr., Bernard P. |
|
1988 |
7 |
1 |
p. 35-36 2 p. |
artikel |
16 |
Disaster recovery needed
|
Hunter, Philip |
|
1988 |
7 |
1 |
p. 104- 1 p. |
artikel |
17 |
Editorial Board
|
|
|
1988 |
7 |
1 |
p. 2- 1 p. |
artikel |
18 |
Electromagnetic interference
|
Highland, Harold Joseph |
|
1988 |
7 |
1 |
p. 9-10 2 p. |
artikel |
19 |
Element-level classification with A1 assurance
|
Lunt, Teresa F. |
|
1988 |
7 |
1 |
p. 73-82 10 p. |
artikel |
20 |
Encryption, attacks and ethics
|
Highland, Harold Joseph |
|
1988 |
7 |
1 |
p. 5-6 2 p. |
artikel |
21 |
Encryption standard to get reprieve
|
Betts, Mitch |
|
1988 |
7 |
1 |
p. 106- 1 p. |
artikel |
22 |
Expert tells DoD it needs training, not more tempest
|
Munro, Neil |
|
1988 |
7 |
1 |
p. 108- 1 p. |
artikel |
23 |
Fault tolerant computers and multiprocessing. January 1985–June 1987
|
|
|
1988 |
7 |
1 |
p. 107- 1 p. |
artikel |
24 |
Fighting software piracy
|
|
|
1988 |
7 |
1 |
p. 101- 1 p. |
artikel |
25 |
Fire and humidity: Data safes protect against both
|
Sopko, Sandra |
|
1988 |
7 |
1 |
p. 106- 1 p. |
artikel |
26 |
For your information
|
Highland, Harold Joseph |
|
1988 |
7 |
1 |
p. 10-11 2 p. |
artikel |
27 |
From the editor
|
|
|
1988 |
7 |
1 |
p. 2- 1 p. |
artikel |
28 |
German computer hobbyists rifle NASA's files
|
|
|
1988 |
7 |
1 |
p. 102- 1 p. |
artikel |
29 |
Getting started in data processing disaster recovery
|
Menkus, Belden |
|
1988 |
7 |
1 |
p. 47-52 6 p. |
artikel |
30 |
Guidelines or standards! part one
|
|
|
1988 |
7 |
1 |
p. 101- 1 p. |
artikel |
31 |
Has EDP audit progressed in the last 15 years?
|
Weber, Ron |
|
1988 |
7 |
1 |
p. 103- 1 p. |
artikel |
32 |
HK raid uncovers autodesk pirates
|
|
|
1988 |
7 |
1 |
p. 102- 1 p. |
artikel |
33 |
Hospital's medical data held in strict security
|
|
|
1988 |
7 |
1 |
p. 106- 1 p. |
artikel |
34 |
How secure are fiber optics communications?
|
Highland, Harold Joseph |
|
1988 |
7 |
1 |
p. 25-26 2 p. |
artikel |
35 |
How to protect a microcomputer system
|
Highland, Harold Joseph |
|
1988 |
7 |
1 |
p. 6-7 2 p. |
artikel |
36 |
IBM slow to remedy leaky DB2 security
|
Bozman, Jean S. |
|
1988 |
7 |
1 |
p. 104- 1 p. |
artikel |
37 |
IBM users told data files could have legal pitfalls
|
Goff, Leslie |
|
1988 |
7 |
1 |
p. 105- 1 p. |
artikel |
38 |
IFIP/Sec '88
|
Highland, Harold Joseph |
|
1988 |
7 |
1 |
p. 10- 1 p. |
artikel |
39 |
IFIP technical committee 11
|
|
|
1988 |
7 |
1 |
p. 95-96 2 p. |
artikel |
40 |
In Japan, MIS weathers the storm easily
|
Ko, Dorothy |
|
1988 |
7 |
1 |
p. 107- 1 p. |
artikel |
41 |
In London, stocks up and computers down
|
Hunter, Philip |
|
1988 |
7 |
1 |
p. 107- 1 p. |
artikel |
42 |
International board of referees
|
|
|
1988 |
7 |
1 |
p. 45-46 2 p. |
artikel |
43 |
Justice Ordered to pay software licensing fees
|
|
|
1988 |
7 |
1 |
p. 101- 1 p. |
artikel |
44 |
LANS introduce new security issues
|
Chandler, Harriette L. |
|
1988 |
7 |
1 |
p. 106- 1 p. |
artikel |
45 |
LA sites rocked
|
Jones, Stephen |
|
1988 |
7 |
1 |
p. 105- 1 p. |
artikel |
46 |
Lotus promises new releases, no protection
|
|
|
1988 |
7 |
1 |
p. 102- 1 p. |
artikel |
47 |
Message authentication and encryption combined
|
Christoffersson, Per |
|
1988 |
7 |
1 |
p. 65-71 7 p. |
artikel |
48 |
MIS computer security slacking
|
|
|
1988 |
7 |
1 |
p. 102- 1 p. |
artikel |
49 |
NASA says classified data not breached
|
|
|
1988 |
7 |
1 |
p. 102-103 2 p. |
artikel |
50 |
Network security and access controls
|
Amsel,, Ellen |
|
1988 |
7 |
1 |
p. 53-57 5 p. |
artikel |
51 |
“Never mind!” businesses cool off on site license issue
|
|
|
1988 |
7 |
1 |
p. 103- 1 p. |
artikel |
52 |
New locks and keys for electronic information
|
|
|
1988 |
7 |
1 |
p. 89-93 5 p. |
artikel |
53 |
New risk management lab will tackle security needs
|
Munro, Neil |
|
1988 |
7 |
1 |
p. 105- 1 p. |
artikel |
54 |
North didn't understand delete function
|
McDonald, Evelyn C. |
|
1988 |
7 |
1 |
p. 104- 1 p. |
artikel |
55 |
OSI security system revealed
|
Horwitt, Elisabeth |
|
1988 |
7 |
1 |
p. 105- 1 p. |
artikel |
56 |
Processing encrypted data
|
|
|
1988 |
7 |
1 |
p. 103- 1 p. |
artikel |
57 |
Product reviews
|
Highland, Harold Joseph |
|
1988 |
7 |
1 |
p. 13-18 6 p. |
artikel |
58 |
Program aids for office automation security
|
Highland,, Harold Joseph |
|
1988 |
7 |
1 |
p. 37-43 7 p. |
artikel |
59 |
Protecting statistical databases against retrieval of private information
|
Ahituv, Niv |
|
1988 |
7 |
1 |
p. 59-63 5 p. |
artikel |
60 |
Public policy and internal privacy codes
|
|
|
1988 |
7 |
1 |
p. 103- 1 p. |
artikel |
61 |
Public-private partners work on secure protocols
|
Miles, J.B. |
|
1988 |
7 |
1 |
p. 108- 1 p. |
artikel |
62 |
Report says computers spy on 7 million workers in US
|
|
|
1988 |
7 |
1 |
p. 103-104 2 p. |
artikel |
63 |
Secretdisk II— transparent automatic encryption
|
Highland, Harold Joseph |
|
1988 |
7 |
1 |
p. 27-34 8 p. |
artikel |
64 |
Secure information is accurate information
|
Hargrove, Robert |
|
1988 |
7 |
1 |
p. 104- 1 p. |
artikel |
65 |
Security and office automation
|
Wong, Ken |
|
1988 |
7 |
1 |
p. 106-107 2 p. |
artikel |
66 |
Security issues concern NSA, vendors
|
|
|
1988 |
7 |
1 |
p. 106- 1 p. |
artikel |
67 |
Software still is arriving with those annoying bugs
|
Perry, William E. |
|
1988 |
7 |
1 |
p. 108- 1 p. |
artikel |
68 |
Tactical planning for data security management
|
|
|
1988 |
7 |
1 |
p. 103- 1 p. |
artikel |
69 |
The automated cryptananysis of polyalphabetic ciphers
|
Carroll, John M. |
|
1988 |
7 |
1 |
p. 104- 1 p. |
artikel |
70 |
Today's computer crime: The threat from within
|
ben-Aaron, Diana |
|
1988 |
7 |
1 |
p. 107- 1 p. |
artikel |
71 |
1-2-3 to go unprotected
|
|
|
1988 |
7 |
1 |
p. 102- 1 p. |
artikel |
72 |
Unclassified security calls for a ‘friendly’ approach
|
Miles, J.B. |
|
1988 |
7 |
1 |
p. 108- 1 p. |
artikel |
73 |
Users see flaws in audit trails, access authority
|
Bozman, Jean S. |
|
1988 |
7 |
1 |
p. 104- 1 p. |
artikel |
74 |
When the password is a passkey
|
Lewis, Peter H. |
|
1988 |
7 |
1 |
p. 103- 1 p. |
artikel |
75 |
World-wide reports on developments in computer security
|
|
|
1988 |
7 |
1 |
p. 97-100 4 p. |
artikel |