nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An introduction to database security
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 329- 1 p. |
artikel |
2 |
Apple slaps microsoft, HP with copyright suit
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 321-322 2 p. |
artikel |
3 |
Are apple and lotus unfair?
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 322- 1 p. |
artikel |
4 |
A sensible approach to protecting your data
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 328- 1 p. |
artikel |
5 |
A virus gives business a chill
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 326- 1 p. |
artikel |
6 |
Blitzed by a computer virus
|
Harold Joseph Highland, Dr. |
|
1988 |
7 |
3 |
p. 237-239 3 p. |
artikel |
7 |
Brazil copyright law could thwart pirates
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 321- 1 p. |
artikel |
8 |
Breakpoints
|
Menkus, Belden |
|
1988 |
7 |
3 |
p. 261-268 8 p. |
artikel |
9 |
Calamities spark growing field
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 326-327 2 p. |
artikel |
10 |
Calendar
|
|
|
1988 |
7 |
3 |
p. 332- 1 p. |
artikel |
11 |
Computer backup pools, disaster recovery, and default risk
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 324- 1 p. |
artikel |
12 |
Computer crime: MIS confronts a cancer
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 327- 1 p. |
artikel |
13 |
Computer cross sections unite at law conference
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 321- 1 p. |
artikel |
14 |
Computer insurance: The gaps
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 322-323 2 p. |
artikel |
15 |
Computer security: The federal approach
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 320-321 2 p. |
artikel |
16 |
Computer systems under siege
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 325- 1 p. |
artikel |
17 |
Computer viruses spread
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 325- 1 p. |
artikel |
18 |
Computer weekly
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 323- 1 p. |
artikel |
19 |
Cryptographic figures of merit
|
Van der Bank, Dirk |
|
1988 |
7 |
3 |
p. 299-303 5 p. |
artikel |
20 |
DEC computer security tactics come into focus
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 328- 1 p. |
artikel |
21 |
Decentralized DP sites seen lacking in recovery planning
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 328- 1 p. |
artikel |
22 |
Designing provably correct information networks with digital diodes
|
Cohen, Fred |
|
1988 |
7 |
3 |
p. 279-286 8 p. |
artikel |
23 |
Disaster recovery planning
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 323- 1 p. |
artikel |
24 |
Distributed data processing: New problems
|
Zajac Jr., Bernard P. |
|
1988 |
7 |
3 |
p. 249-250 2 p. |
artikel |
25 |
Disturbance in several forms
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 328- 1 p. |
artikel |
26 |
DOD fights off computer virus
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 325-326 2 p. |
artikel |
27 |
Exec liable in software copy case, court rules
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 322- 1 p. |
artikel |
28 |
Fault tolerance increasingly important for LANS
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 327- 1 p. |
artikel |
29 |
From the editor
|
Highlands, Dr.Harold Joseph |
|
1988 |
7 |
3 |
p. 228- 1 p. |
artikel |
30 |
Hashing out legal rights
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 321- 1 p. |
artikel |
31 |
Highlights of IFIP TC 11 meeting
|
|
|
1988 |
7 |
3 |
p. 307-308 2 p. |
artikel |
32 |
House Bill would increase 1989 funding for NBS
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 322- 1 p. |
artikel |
33 |
How to test a virus filter without a virus
|
Harold Joseph Highland, Dr. |
|
1988 |
7 |
3 |
p. 235-237 3 p. |
artikel |
34 |
H-P, microsoft respond to apple copyright suit
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 322- 1 p. |
artikel |
35 |
HR 145: What's next
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 320- 1 p. |
artikel |
36 |
IFIP technical committee 11
|
|
|
1988 |
7 |
3 |
p. 305-306 2 p. |
artikel |
37 |
Information property: Some intellectual property aspects of the global information economy
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 322- 1 p. |
artikel |
38 |
International board of referees
|
|
|
1988 |
7 |
3 |
p. 269-270 2 p. |
artikel |
39 |
It's critical to make PC security as flexible as PCs themselves
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 329-330 2 p. |
artikel |
40 |
LAN security
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 324- 1 p. |
artikel |
41 |
Legal protection of software in the United Kingdom
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 323- 1 p. |
artikel |
42 |
Letters to the editor
|
|
|
1988 |
7 |
3 |
p. 229-231 3 p. |
artikel |
43 |
Long arm of the law
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 321- 1 p. |
artikel |
44 |
Make a plan for PC disaster recovery
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 329- 1 p. |
artikel |
45 |
Managing an information system crisis
|
Bologna, Jack |
|
1988 |
7 |
3 |
p. 245-247 3 p. |
artikel |
46 |
MCSC regs outline basic security level for PCs
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 330- 1 p. |
artikel |
47 |
Microcomputer security and control
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 326- 1 p. |
artikel |
48 |
New emphasis given to UNIX security problems
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 326- 1 p. |
artikel |
49 |
New security law compels federal agencies to act
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 321- 1 p. |
artikel |
50 |
NSA suppresses GAO report
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 323-324 2 p. |
artikel |
51 |
Open Sesame-Hackers welcome
|
Harold Joseph Highland, Dr. |
|
1988 |
7 |
3 |
p. 232-233 2 p. |
artikel |
52 |
Pentagon attacks viruses
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 323- 1 p. |
artikel |
53 |
Personal but not confidential: A new davate over privacy
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 321- 1 p. |
artikel |
54 |
Planning, consulting boost biometric bill
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 327- 1 p. |
artikel |
55 |
Power quality issues smack micro market
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 328- 1 p. |
artikel |
56 |
Preventive measures to ensure PC data security
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 328-329 2 p. |
artikel |
57 |
Programmer workstation security
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 329- 1 p. |
artikel |
58 |
Recent rulings may give states copyright immunity
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 320- 1 p. |
artikel |
59 |
Red book includes a metaphysical look at security
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 324-325 2 p. |
artikel |
60 |
Reliable power: Beyond the big box
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 329- 1 p. |
artikel |
61 |
Report on the fourth national computer security conference: COMPSEC IV
|
Highland, Dr.Harold Joseph |
|
1988 |
7 |
3 |
p. 309-311 3 p. |
artikel |
62 |
Revised list of virus filters
|
|
|
1988 |
7 |
3 |
p. 259-260 2 p. |
artikel |
63 |
“Safe computing” catching
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 326- 1 p. |
artikel |
64 |
Satellite communications for disaster recovery
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 326- 1 p. |
artikel |
65 |
Secure access control and MAC-based signatures
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 323- 1 p. |
artikel |
66 |
Security act is signed: Copyright Bill backed
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 320- 1 p. |
artikel |
67 |
Security and software: Are you fully insured?
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 325- 1 p. |
artikel |
68 |
Security basics for cable/video display radiation
|
|
|
1988 |
7 |
3 |
p. 330-331 2 p. |
artikel |
69 |
Security director's dilemma
|
Harold Joseph Highland, Dr. |
|
1988 |
7 |
3 |
p. 233-235 3 p. |
artikel |
70 |
Security systems rescue data from snoopers, user blunders
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 327- 1 p. |
artikel |
71 |
Software, hardware “vaccines” stem threat of deadly computer viruses
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 325- 1 p. |
artikel |
72 |
Some notes on authorization and transaction management in distributed database systems
|
Pluimakers, G.M.J. |
|
1988 |
7 |
3 |
p. 287-298 12 p. |
artikel |
73 |
Special virus protection measures
|
Harold Joseph Highland, Dr. |
|
1988 |
7 |
3 |
p. 239-242 4 p. |
artikel |
74 |
Star wars security or where did those micros go?
|
Harold Joseph Highland, Dr. |
|
1988 |
7 |
3 |
p. 243-244 2 p. |
artikel |
75 |
Structing the data security program
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 327- 1 p. |
artikel |
76 |
Tangible losses
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 324- 1 p. |
artikel |
77 |
Tempest micros
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 324- 1 p. |
artikel |
78 |
The computer security act of 1987
|
Will Milor, G. |
|
1988 |
7 |
3 |
p. 251-253 3 p. |
artikel |
79 |
The “look and feel” debate
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 322- 1 p. |
artikel |
80 |
The second European conference on computer audit, control and security
|
Ronald Paans, Dr. |
|
1988 |
7 |
3 |
p. 312-315 4 p. |
artikel |
81 |
The technical EDP-audit function
|
van Biene-Hershey, Margaret E. |
|
1988 |
7 |
3 |
p. 271-277 7 p. |
artikel |
82 |
Top secret—Concepts and implementation
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 329- 1 p. |
artikel |
83 |
Treating viral fever
|
David, Jon |
|
1988 |
7 |
3 |
p. 255-258 4 p. |
artikel |
84 |
Typical system access control problems and solutions
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 323- 1 p. |
artikel |
85 |
Under new rule, auditors must search out fraud
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 326- 1 p. |
artikel |
86 |
Unprotected symphony tunes up
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 324- 1 p. |
artikel |
87 |
Upcoming conferences of note
|
Harold Joseph Highland, Dr. |
|
1988 |
7 |
3 |
p. 242-243 2 p. |
artikel |
88 |
Virus disaster red book
|
Harold Joseph Highland, Dr. |
|
1988 |
7 |
3 |
p. 237- 1 p. |
artikel |
89 |
Virus that could kill
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 323- 1 p. |
artikel |
90 |
VMSecure: Enhancing VM security and control
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 327-328 2 p. |
artikel |
91 |
Voice, finger and retina scans: Can biometrics secure your shop?
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 327- 1 p. |
artikel |
92 |
What about users should know about PC security
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 328- 1 p. |
artikel |
93 |
What others are saying
|
|
|
1988 |
7 |
3 |
p. 316-319 4 p. |
artikel |
94 |
When trouble strikes, a UPS can save the data
|
Highland, Esther H. |
|
1988 |
7 |
3 |
p. 329- 1 p. |
artikel |