Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             75 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Addresses of publications 1988
7 1 p. 108-110
3 p.
artikel
2 After the street's unforgettable week all info systems are (mostly) go Crockett, Barton
1988
7 1 p. 107-
1 p.
artikel
3 Analysis of the encryption algorithm used in the wordperfect word processing program Bennett, John
1988
7 1 p. 105-
1 p.
artikel
4 Anatomy of a disaster 1988
7 1 p. 101-
1 p.
artikel
5 Another perspective on sensitive but unclassified data Courtney Jr., Robert H.
1988
7 1 p. 19-23
5 p.
artikel
6 Apple urges separate copyright registration of screen displays 1988
7 1 p. 101-
1 p.
artikel
7 A public-key cryptosystem based on language theory Salomaa, Arto
1988
7 1 p. 83-87
5 p.
artikel
8 Calendar 1988
7 1 p. 111-
1 p.
artikel
9 Case history of a virus attack Highland, Harold Joseph
1988
7 1 p. 3-5
3 p.
artikel
10 Chernobyl computer communications Highland, Harold Joseph
1988
7 1 p. 7-9
3 p.
artikel
11 Computer crime—What to do before it happens 1988
7 1 p. 102-
1 p.
artikel
12 Computer trouble makes British skies unfriendly Hunter, Philip
1988
7 1 p. 105-
1 p.
artikel
13 Data errors hurt state department system Grimm, Vanessa Jo
1988
7 1 p. 105-106
2 p.
artikel
14 Development of confidence limits by pivotal functions for estimating software reliability 1988
7 1 p. 107-
1 p.
artikel
15 Dial-up communication lines: Can they be secured? Zajac Jr., Bernard P.
1988
7 1 p. 35-36
2 p.
artikel
16 Disaster recovery needed Hunter, Philip
1988
7 1 p. 104-
1 p.
artikel
17 Editorial Board 1988
7 1 p. 2-
1 p.
artikel
18 Electromagnetic interference Highland, Harold Joseph
1988
7 1 p. 9-10
2 p.
artikel
19 Element-level classification with A1 assurance Lunt, Teresa F.
1988
7 1 p. 73-82
10 p.
artikel
20 Encryption, attacks and ethics Highland, Harold Joseph
1988
7 1 p. 5-6
2 p.
artikel
21 Encryption standard to get reprieve Betts, Mitch
1988
7 1 p. 106-
1 p.
artikel
22 Expert tells DoD it needs training, not more tempest Munro, Neil
1988
7 1 p. 108-
1 p.
artikel
23 Fault tolerant computers and multiprocessing. January 1985–June 1987 1988
7 1 p. 107-
1 p.
artikel
24 Fighting software piracy 1988
7 1 p. 101-
1 p.
artikel
25 Fire and humidity: Data safes protect against both Sopko, Sandra
1988
7 1 p. 106-
1 p.
artikel
26 For your information Highland, Harold Joseph
1988
7 1 p. 10-11
2 p.
artikel
27 From the editor 1988
7 1 p. 2-
1 p.
artikel
28 German computer hobbyists rifle NASA's files 1988
7 1 p. 102-
1 p.
artikel
29 Getting started in data processing disaster recovery Menkus, Belden
1988
7 1 p. 47-52
6 p.
artikel
30 Guidelines or standards! part one 1988
7 1 p. 101-
1 p.
artikel
31 Has EDP audit progressed in the last 15 years? Weber, Ron
1988
7 1 p. 103-
1 p.
artikel
32 HK raid uncovers autodesk pirates 1988
7 1 p. 102-
1 p.
artikel
33 Hospital's medical data held in strict security 1988
7 1 p. 106-
1 p.
artikel
34 How secure are fiber optics communications? Highland, Harold Joseph
1988
7 1 p. 25-26
2 p.
artikel
35 How to protect a microcomputer system Highland, Harold Joseph
1988
7 1 p. 6-7
2 p.
artikel
36 IBM slow to remedy leaky DB2 security Bozman, Jean S.
1988
7 1 p. 104-
1 p.
artikel
37 IBM users told data files could have legal pitfalls Goff, Leslie
1988
7 1 p. 105-
1 p.
artikel
38 IFIP/Sec '88 Highland, Harold Joseph
1988
7 1 p. 10-
1 p.
artikel
39 IFIP technical committee 11 1988
7 1 p. 95-96
2 p.
artikel
40 In Japan, MIS weathers the storm easily Ko, Dorothy
1988
7 1 p. 107-
1 p.
artikel
41 In London, stocks up and computers down Hunter, Philip
1988
7 1 p. 107-
1 p.
artikel
42 International board of referees 1988
7 1 p. 45-46
2 p.
artikel
43 Justice Ordered to pay software licensing fees 1988
7 1 p. 101-
1 p.
artikel
44 LANS introduce new security issues Chandler, Harriette L.
1988
7 1 p. 106-
1 p.
artikel
45 LA sites rocked Jones, Stephen
1988
7 1 p. 105-
1 p.
artikel
46 Lotus promises new releases, no protection 1988
7 1 p. 102-
1 p.
artikel
47 Message authentication and encryption combined Christoffersson, Per
1988
7 1 p. 65-71
7 p.
artikel
48 MIS computer security slacking 1988
7 1 p. 102-
1 p.
artikel
49 NASA says classified data not breached 1988
7 1 p. 102-103
2 p.
artikel
50 Network security and access controls Amsel,, Ellen
1988
7 1 p. 53-57
5 p.
artikel
51 “Never mind!” businesses cool off on site license issue 1988
7 1 p. 103-
1 p.
artikel
52 New locks and keys for electronic information 1988
7 1 p. 89-93
5 p.
artikel
53 New risk management lab will tackle security needs Munro, Neil
1988
7 1 p. 105-
1 p.
artikel
54 North didn't understand delete function McDonald, Evelyn C.
1988
7 1 p. 104-
1 p.
artikel
55 OSI security system revealed Horwitt, Elisabeth
1988
7 1 p. 105-
1 p.
artikel
56 Processing encrypted data 1988
7 1 p. 103-
1 p.
artikel
57 Product reviews Highland, Harold Joseph
1988
7 1 p. 13-18
6 p.
artikel
58 Program aids for office automation security Highland,, Harold Joseph
1988
7 1 p. 37-43
7 p.
artikel
59 Protecting statistical databases against retrieval of private information Ahituv, Niv
1988
7 1 p. 59-63
5 p.
artikel
60 Public policy and internal privacy codes 1988
7 1 p. 103-
1 p.
artikel
61 Public-private partners work on secure protocols Miles, J.B.
1988
7 1 p. 108-
1 p.
artikel
62 Report says computers spy on 7 million workers in US 1988
7 1 p. 103-104
2 p.
artikel
63 Secretdisk II— transparent automatic encryption Highland, Harold Joseph
1988
7 1 p. 27-34
8 p.
artikel
64 Secure information is accurate information Hargrove, Robert
1988
7 1 p. 104-
1 p.
artikel
65 Security and office automation Wong, Ken
1988
7 1 p. 106-107
2 p.
artikel
66 Security issues concern NSA, vendors 1988
7 1 p. 106-
1 p.
artikel
67 Software still is arriving with those annoying bugs Perry, William E.
1988
7 1 p. 108-
1 p.
artikel
68 Tactical planning for data security management 1988
7 1 p. 103-
1 p.
artikel
69 The automated cryptananysis of polyalphabetic ciphers Carroll, John M.
1988
7 1 p. 104-
1 p.
artikel
70 Today's computer crime: The threat from within ben-Aaron, Diana
1988
7 1 p. 107-
1 p.
artikel
71 1-2-3 to go unprotected 1988
7 1 p. 102-
1 p.
artikel
72 Unclassified security calls for a ‘friendly’ approach Miles, J.B.
1988
7 1 p. 108-
1 p.
artikel
73 Users see flaws in audit trails, access authority Bozman, Jean S.
1988
7 1 p. 104-
1 p.
artikel
74 When the password is a passkey Lewis, Peter H.
1988
7 1 p. 103-
1 p.
artikel
75 World-wide reports on developments in computer security 1988
7 1 p. 97-100
4 p.
artikel
                             75 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland