Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             94 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 An introduction to database security Highland, Esther H.
1988
7 3 p. 329-
1 p.
artikel
2 Apple slaps microsoft, HP with copyright suit Highland, Esther H.
1988
7 3 p. 321-322
2 p.
artikel
3 Are apple and lotus unfair? Highland, Esther H.
1988
7 3 p. 322-
1 p.
artikel
4 A sensible approach to protecting your data Highland, Esther H.
1988
7 3 p. 328-
1 p.
artikel
5 A virus gives business a chill Highland, Esther H.
1988
7 3 p. 326-
1 p.
artikel
6 Blitzed by a computer virus Harold Joseph Highland, Dr.
1988
7 3 p. 237-239
3 p.
artikel
7 Brazil copyright law could thwart pirates Highland, Esther H.
1988
7 3 p. 321-
1 p.
artikel
8 Breakpoints Menkus, Belden
1988
7 3 p. 261-268
8 p.
artikel
9 Calamities spark growing field Highland, Esther H.
1988
7 3 p. 326-327
2 p.
artikel
10 Calendar 1988
7 3 p. 332-
1 p.
artikel
11 Computer backup pools, disaster recovery, and default risk Highland, Esther H.
1988
7 3 p. 324-
1 p.
artikel
12 Computer crime: MIS confronts a cancer Highland, Esther H.
1988
7 3 p. 327-
1 p.
artikel
13 Computer cross sections unite at law conference Highland, Esther H.
1988
7 3 p. 321-
1 p.
artikel
14 Computer insurance: The gaps Highland, Esther H.
1988
7 3 p. 322-323
2 p.
artikel
15 Computer security: The federal approach Highland, Esther H.
1988
7 3 p. 320-321
2 p.
artikel
16 Computer systems under siege Highland, Esther H.
1988
7 3 p. 325-
1 p.
artikel
17 Computer viruses spread Highland, Esther H.
1988
7 3 p. 325-
1 p.
artikel
18 Computer weekly Highland, Esther H.
1988
7 3 p. 323-
1 p.
artikel
19 Cryptographic figures of merit Van der Bank, Dirk
1988
7 3 p. 299-303
5 p.
artikel
20 DEC computer security tactics come into focus Highland, Esther H.
1988
7 3 p. 328-
1 p.
artikel
21 Decentralized DP sites seen lacking in recovery planning Highland, Esther H.
1988
7 3 p. 328-
1 p.
artikel
22 Designing provably correct information networks with digital diodes Cohen, Fred
1988
7 3 p. 279-286
8 p.
artikel
23 Disaster recovery planning Highland, Esther H.
1988
7 3 p. 323-
1 p.
artikel
24 Distributed data processing: New problems Zajac Jr., Bernard P.
1988
7 3 p. 249-250
2 p.
artikel
25 Disturbance in several forms Highland, Esther H.
1988
7 3 p. 328-
1 p.
artikel
26 DOD fights off computer virus Highland, Esther H.
1988
7 3 p. 325-326
2 p.
artikel
27 Exec liable in software copy case, court rules Highland, Esther H.
1988
7 3 p. 322-
1 p.
artikel
28 Fault tolerance increasingly important for LANS Highland, Esther H.
1988
7 3 p. 327-
1 p.
artikel
29 From the editor Highlands, Dr.Harold Joseph
1988
7 3 p. 228-
1 p.
artikel
30 Hashing out legal rights Highland, Esther H.
1988
7 3 p. 321-
1 p.
artikel
31 Highlights of IFIP TC 11 meeting 1988
7 3 p. 307-308
2 p.
artikel
32 House Bill would increase 1989 funding for NBS Highland, Esther H.
1988
7 3 p. 322-
1 p.
artikel
33 How to test a virus filter without a virus Harold Joseph Highland, Dr.
1988
7 3 p. 235-237
3 p.
artikel
34 H-P, microsoft respond to apple copyright suit Highland, Esther H.
1988
7 3 p. 322-
1 p.
artikel
35 HR 145: What's next Highland, Esther H.
1988
7 3 p. 320-
1 p.
artikel
36 IFIP technical committee 11 1988
7 3 p. 305-306
2 p.
artikel
37 Information property: Some intellectual property aspects of the global information economy Highland, Esther H.
1988
7 3 p. 322-
1 p.
artikel
38 International board of referees 1988
7 3 p. 269-270
2 p.
artikel
39 It's critical to make PC security as flexible as PCs themselves Highland, Esther H.
1988
7 3 p. 329-330
2 p.
artikel
40 LAN security Highland, Esther H.
1988
7 3 p. 324-
1 p.
artikel
41 Legal protection of software in the United Kingdom Highland, Esther H.
1988
7 3 p. 323-
1 p.
artikel
42 Letters to the editor 1988
7 3 p. 229-231
3 p.
artikel
43 Long arm of the law Highland, Esther H.
1988
7 3 p. 321-
1 p.
artikel
44 Make a plan for PC disaster recovery Highland, Esther H.
1988
7 3 p. 329-
1 p.
artikel
45 Managing an information system crisis Bologna, Jack
1988
7 3 p. 245-247
3 p.
artikel
46 MCSC regs outline basic security level for PCs Highland, Esther H.
1988
7 3 p. 330-
1 p.
artikel
47 Microcomputer security and control Highland, Esther H.
1988
7 3 p. 326-
1 p.
artikel
48 New emphasis given to UNIX security problems Highland, Esther H.
1988
7 3 p. 326-
1 p.
artikel
49 New security law compels federal agencies to act Highland, Esther H.
1988
7 3 p. 321-
1 p.
artikel
50 NSA suppresses GAO report Highland, Esther H.
1988
7 3 p. 323-324
2 p.
artikel
51 Open Sesame-Hackers welcome Harold Joseph Highland, Dr.
1988
7 3 p. 232-233
2 p.
artikel
52 Pentagon attacks viruses Highland, Esther H.
1988
7 3 p. 323-
1 p.
artikel
53 Personal but not confidential: A new davate over privacy Highland, Esther H.
1988
7 3 p. 321-
1 p.
artikel
54 Planning, consulting boost biometric bill Highland, Esther H.
1988
7 3 p. 327-
1 p.
artikel
55 Power quality issues smack micro market Highland, Esther H.
1988
7 3 p. 328-
1 p.
artikel
56 Preventive measures to ensure PC data security Highland, Esther H.
1988
7 3 p. 328-329
2 p.
artikel
57 Programmer workstation security Highland, Esther H.
1988
7 3 p. 329-
1 p.
artikel
58 Recent rulings may give states copyright immunity Highland, Esther H.
1988
7 3 p. 320-
1 p.
artikel
59 Red book includes a metaphysical look at security Highland, Esther H.
1988
7 3 p. 324-325
2 p.
artikel
60 Reliable power: Beyond the big box Highland, Esther H.
1988
7 3 p. 329-
1 p.
artikel
61 Report on the fourth national computer security conference: COMPSEC IV Highland, Dr.Harold Joseph
1988
7 3 p. 309-311
3 p.
artikel
62 Revised list of virus filters 1988
7 3 p. 259-260
2 p.
artikel
63 “Safe computing” catching Highland, Esther H.
1988
7 3 p. 326-
1 p.
artikel
64 Satellite communications for disaster recovery Highland, Esther H.
1988
7 3 p. 326-
1 p.
artikel
65 Secure access control and MAC-based signatures Highland, Esther H.
1988
7 3 p. 323-
1 p.
artikel
66 Security act is signed: Copyright Bill backed Highland, Esther H.
1988
7 3 p. 320-
1 p.
artikel
67 Security and software: Are you fully insured? Highland, Esther H.
1988
7 3 p. 325-
1 p.
artikel
68 Security basics for cable/video display radiation 1988
7 3 p. 330-331
2 p.
artikel
69 Security director's dilemma Harold Joseph Highland, Dr.
1988
7 3 p. 233-235
3 p.
artikel
70 Security systems rescue data from snoopers, user blunders Highland, Esther H.
1988
7 3 p. 327-
1 p.
artikel
71 Software, hardware “vaccines” stem threat of deadly computer viruses Highland, Esther H.
1988
7 3 p. 325-
1 p.
artikel
72 Some notes on authorization and transaction management in distributed database systems Pluimakers, G.M.J.
1988
7 3 p. 287-298
12 p.
artikel
73 Special virus protection measures Harold Joseph Highland, Dr.
1988
7 3 p. 239-242
4 p.
artikel
74 Star wars security or where did those micros go? Harold Joseph Highland, Dr.
1988
7 3 p. 243-244
2 p.
artikel
75 Structing the data security program Highland, Esther H.
1988
7 3 p. 327-
1 p.
artikel
76 Tangible losses Highland, Esther H.
1988
7 3 p. 324-
1 p.
artikel
77 Tempest micros Highland, Esther H.
1988
7 3 p. 324-
1 p.
artikel
78 The computer security act of 1987 Will Milor, G.
1988
7 3 p. 251-253
3 p.
artikel
79 The “look and feel” debate Highland, Esther H.
1988
7 3 p. 322-
1 p.
artikel
80 The second European conference on computer audit, control and security Ronald Paans, Dr.
1988
7 3 p. 312-315
4 p.
artikel
81 The technical EDP-audit function van Biene-Hershey, Margaret E.
1988
7 3 p. 271-277
7 p.
artikel
82 Top secret—Concepts and implementation Highland, Esther H.
1988
7 3 p. 329-
1 p.
artikel
83 Treating viral fever David, Jon
1988
7 3 p. 255-258
4 p.
artikel
84 Typical system access control problems and solutions Highland, Esther H.
1988
7 3 p. 323-
1 p.
artikel
85 Under new rule, auditors must search out fraud Highland, Esther H.
1988
7 3 p. 326-
1 p.
artikel
86 Unprotected symphony tunes up Highland, Esther H.
1988
7 3 p. 324-
1 p.
artikel
87 Upcoming conferences of note Harold Joseph Highland, Dr.
1988
7 3 p. 242-243
2 p.
artikel
88 Virus disaster red book Harold Joseph Highland, Dr.
1988
7 3 p. 237-
1 p.
artikel
89 Virus that could kill Highland, Esther H.
1988
7 3 p. 323-
1 p.
artikel
90 VMSecure: Enhancing VM security and control Highland, Esther H.
1988
7 3 p. 327-328
2 p.
artikel
91 Voice, finger and retina scans: Can biometrics secure your shop? Highland, Esther H.
1988
7 3 p. 327-
1 p.
artikel
92 What about users should know about PC security Highland, Esther H.
1988
7 3 p. 328-
1 p.
artikel
93 What others are saying 1988
7 3 p. 316-319
4 p.
artikel
94 When trouble strikes, a UPS can save the data Highland, Esther H.
1988
7 3 p. 329-
1 p.
artikel
                             94 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland