Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             76 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Aftershocks for Silicon Valley 1988
7 2 p. 213-
1 p.
artikel
2 Anatomy of a virus attack Highland, Harold Joseph
1988
7 2 p. 145-150
6 p.
artikel
3 An overview of 18 virus protection products Highland, Harold Joseph
1988
7 2 p. 157-161
5 p.
artikel
4 ANSI, Feds address DMBS security 1988
7 2 p. 220-
1 p.
artikel
5 Apollo skirts site license issue 1988
7 2 p. 217-
1 p.
artikel
6 Are we vulnerable to a virus attack? A report from Sweden Fåk, Viiveke
1988
7 2 p. 151-155
5 p.
artikel
7 A security checklist for upper management 1988
7 2 p. 219-
1 p.
artikel
8 Battling Mediocrity 1988
7 2 p. 217-
1 p.
artikel
9 Buyers turning toward software escrow plans 1988
7 2 p. 215-216
2 p.
artikel
10 Calendar 1988
7 2 p. 224-
1 p.
artikel
11 Coalition to combat software piracy 1988
7 2 p. 219-
1 p.
artikel
12 Computer security shift is approved by Senate 1988
7 2 p. 213-214
2 p.
artikel
13 Computer user surveillance 1988
7 2 p. 215-
1 p.
artikel
14 Computer viruses—A secret threat 1988
7 2 p. 215-
1 p.
artikel
15 Conference focuses on reduction of software risks 1988
7 2 p. 216-
1 p.
artikel
16 Crash course: Lessons in preventing computer downtime 1988
7 2 p. 217-
1 p.
artikel
17 Data encryption is key to safe file transmission 1988
7 2 p. 221-
1 p.
artikel
18 Data security provides the key to lock out intruders 1988
7 2 p. 216-
1 p.
artikel
19 Dickerson center of tug-of-war 1988
7 2 p. 213-
1 p.
artikel
20 Discussing security with top management Bound, William A.J.
1988
7 2 p. 129-130
2 p.
artikel
21 Evaluating signature verification systems is tricky 1988
7 2 p. 221-222
2 p.
artikel
22 Expert sees national security risks in BASIS net 1988
7 2 p. 221-
1 p.
artikel
23 Faulty tolerance adds security to critical on-line transactions 1988
7 2 p. 216-
1 p.
artikel
24 From the editor Highland, Harold Joseph
1988
7 2 p. 114-
1 p.
artikel
25 Fuss over bottom line could foil disaster recovery 1988
7 2 p. 220-
1 p.
artikel
26 Guarding your data 1988
7 2 p. 219-
1 p.
artikel
27 Hardware protection of communications ports and lines 1988
7 2 p. 219-
1 p.
artikel
28 Hardware, software security devices protect PCs and inside information 1988
7 2 p. 218-
1 p.
artikel
29 Hold that Lawsuit 1988
7 2 p. 213-
1 p.
artikel
30 Hong Kong focus 1988
7 2 p. 214-
1 p.
artikel
31 Horatius 1988
7 2 p. 215-
1 p.
artikel
32 How to combat a computer virus Highland, Harold Joseph
1988
7 2 p. 157-163
7 p.
artikel
33 How to secure a local area network 1988
7 2 p. 216-
1 p.
artikel
34 IFIP technical committee 11 1988
7 2 p. 205-206
2 p.
artikel
35 Insurance and computers: The technology gap 1988
7 2 p. 215-
1 p.
artikel
36 International board of referees 1988
7 2 p. 165-166
2 p.
artikel
37 Is site licensing a dead issue? 1988
7 2 p. 218-
1 p.
artikel
38 Legal protection for computer software 1988
7 2 p. 213-
1 p.
artikel
39 Letters to the editor 1988
7 2 p. 115-116
2 p.
artikel
40 Loophole gives hackers access to DEC machines 1988
7 2 p. 221-
1 p.
artikel
41 Make the tigers hunt for you Herschberg, I.S.
1988
7 2 p. 197-203
7 p.
artikel
42 Manage/38 1988
7 2 p. 215-
1 p.
artikel
43 Microsoft, Borland Settle Dickerson Case 1988
7 2 p. 213-
1 p.
artikel
44 MIS assumes a shirt-sleeves approach to protecting power 1988
7 2 p. 218-
1 p.
artikel
45 Most systems held fast while storm clouds grew on Wall St 1988
7 2 p. 218-
1 p.
artikel
46 NASD power dip could recur 1988
7 2 p. 220-
1 p.
artikel
47 NBS and NSA stand on different sides of security 1988
7 2 p. 221-
1 p.
artikel
48 Net failures growing concern in workplace 1988
7 2 p. 217-
1 p.
artikel
49 New wave of LAN security products hailed by users 1988
7 2 p. 217-
1 p.
artikel
50 No easy way through data- security maze, consultants say 1988
7 2 p. 218-
1 p.
artikel
51 NSA, NBS coming together on computer security 1988
7 2 p. 217-
1 p.
artikel
52 On the implications of computer viruses and methods of defense Cohen, Fred
1988
7 2 p. 167-184
18 p.
artikel
53 Organizational structuring of the computer security function Straub Jr., Detmar W.
1988
7 2 p. 185-195
11 p.
artikel
54 PC-mainframe ties hard to guard 1988
7 2 p. 216-217
2 p.
artikel
55 Personnel: The other half of data security Zajac Jr., Bernard P.
1988
7 2 p. 131-132
2 p.
artikel
56 Pitfalls in measuring MIS performance Bologna, G.J.
1988
7 2 p. 137-138
2 p.
artikel
57 Policies for secure personal data 1988
7 2 p. 219-
1 p.
artikel
58 Radio frequency interfaces—Myths, realities and a practical approach 1988
7 2 p. 214-
1 p.
artikel
59 Random bits & bytes 1988
7 2 p. 117-127
11 p.
artikel
60 Remote identification and authentication of computer resource users 1988
7 2 p. 214-
1 p.
artikel
61 Security considerations for minicomputer systems acquisitions 1988
7 2 p. 219-
1 p.
artikel
62 Security in the VM environment 1988
7 2 p. 214-
1 p.
artikel
63 Security planning for EFT network systems 1988
7 2 p. 214-215
2 p.
artikel
64 Security systems: Getting management to shell out 1988
7 2 p. 220-221
2 p.
artikel
65 Senate approves funds for DEA tempest equipment 1988
7 2 p. 216-
1 p.
artikel
66 Shrink-wrap licensing 1988
7 2 p. 214-
1 p.
artikel
67 The application of epidemiology to computer viruses Murray, W.H.
1988
7 2 p. 139-145
7 p.
artikel
68 The corporate view 1988
7 2 p. 220-
1 p.
artikel
69 The structure of system/88, a fault-tolerant computer 1988
7 2 p. 218-
1 p.
artikel
70 To catch a thief: Lessons in systems security 1988
7 2 p. 220-
1 p.
artikel
71 Understanding the use of passwords Menkus, Belden
1988
7 2 p. 132-136
5 p.
artikel
72 Uninterruptible power supplies 1988
7 2 p. 218-219
2 p.
artikel
73 Virus defense alert 1988
7 2 p. 156-
1 p.
artikel
74 Wanted: Full-time contingency planners 1988
7 2 p. 220-
1 p.
artikel
75 What others are saying 1988
7 2 p. 210-212
3 p.
artikel
76 World-wide reports on developments in computer security: Part II 1988
7 2 p. 207-209
3 p.
artikel
                             76 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland