nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Addresses of publications
|
|
|
1988 |
7 |
4 |
p. 433- 1 p. |
artikel |
2 |
Agencies fail to appreciate threat to data security
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 430- 1 p. |
artikel |
3 |
Agencies ready forces for data security campaign
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 424- 1 p. |
artikel |
4 |
A nasty bug
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 425- 1 p. |
artikel |
5 |
Apple files response to Microsoft's countersuit
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 423- 1 p. |
artikel |
6 |
Apple-Microsoft suit raises issue of vague copyright laws
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 423- 1 p. |
artikel |
7 |
Apple/Microsoft suit split in two
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 423- 1 p. |
artikel |
8 |
Apple releases “anti-viral” program
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 426- 1 p. |
artikel |
9 |
A redundancy reducing cipher
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 431-432 2 p. |
artikel |
10 |
Are virus attack statistics reliable?
|
Highland, Harold Joseph |
|
1988 |
7 |
4 |
p. 338- 1 p. |
artikel |
11 |
Breach reported in U.S. computers
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 428-429 2 p. |
artikel |
12 |
Calendar
|
|
|
1988 |
7 |
4 |
p. 435- 1 p. |
artikel |
13 |
Can we trust computers?
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 425- 1 p. |
artikel |
14 |
Computer insecurity
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 424- 1 p. |
artikel |
15 |
Computer systems need isolated ground that is safe and noise free
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 432-433 2 p. |
artikel |
16 |
Computer viruses can infect entire organizations
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 426- 1 p. |
artikel |
17 |
Confronting the growing threat of harmful computer software viruses
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 427- 1 p. |
artikel |
18 |
Despite regs, most agencies lack disaster plan
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 431- 1 p. |
artikel |
19 |
Dispute over mac user interface longstanding
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 423- 1 p. |
artikel |
20 |
Electromagnetic eavesdropping machines for christmas?
|
Highland, Harold Joseph |
|
1988 |
7 |
4 |
p. 341- 1 p. |
artikel |
21 |
Ethical issues in computer virus distribution
|
Cohen, Frederick |
|
1988 |
7 |
4 |
p. 335-336 2 p. |
artikel |
22 |
Federal officials puzzled by computer virus attacks
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 426- 1 p. |
artikel |
23 |
Fire KOs Chicago networks
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 432- 1 p. |
artikel |
24 |
Footnote
|
|
|
1988 |
7 |
4 |
p. 346- 1 p. |
artikel |
25 |
From the editor
|
Highland, Harold Joseph |
|
1988 |
7 |
4 |
p. 334- 1 p. |
artikel |
26 |
Hackers revisited
|
Highland, Harold Joseph |
|
1988 |
7 |
4 |
p. 339- 1 p. |
artikel |
27 |
How much is enough? Expert says security efforts should pay, not cost
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 428- 1 p. |
artikel |
28 |
How safe is your data
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 428- 1 p. |
artikel |
29 |
How to obtain a computer virus
|
Highland, Harold Joseph |
|
1988 |
7 |
4 |
p. 337- 1 p. |
artikel |
30 |
How vaccine programs work
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 427- 1 p. |
artikel |
31 |
IFIP technical committee 11
|
|
|
1988 |
7 |
4 |
p. 415-416 2 p. |
artikel |
32 |
Information technology and dataveillance
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 433- 1 p. |
artikel |
33 |
Insurance and the hacker
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 425- 1 p. |
artikel |
34 |
International board of referees
|
|
|
1988 |
7 |
4 |
p. 371-372 2 p. |
artikel |
35 |
Investigating a reported virus attack
|
Highland, Harold Joseph |
|
1988 |
7 |
4 |
p. 344-345 2 p. |
artikel |
36 |
It can't happen here
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 428- 1 p. |
artikel |
37 |
LAN security problem detected on Navy ships
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 430- 1 p. |
artikel |
38 |
Loose MIPS sink ships
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 430- 1 p. |
artikel |
39 |
Lotus removes 1-2-3 protection
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 432- 1 p. |
artikel |
40 |
Macintosh virus seeks EDS signatures
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 426- 1 p. |
artikel |
41 |
Mac virus discovered at EPA, vaccination called successful
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 426- 1 p. |
artikel |
42 |
Mac virus surfaces in Washington
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 425- 1 p. |
artikel |
43 |
MBS, OPM officials plan broad security guidelines
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 423-424 2 p. |
artikel |
44 |
Media security
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 425- 1 p. |
artikel |
45 |
Micro security system effective even on laptops
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 431- 1 p. |
artikel |
46 |
Microsoft charges apple with breach of contract
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 423- 1 p. |
artikel |
47 |
Microsoft seeks to split Apple suit into two phases
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 423- 1 p. |
artikel |
48 |
Monitoring points out weak spots
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 429- 1 p. |
artikel |
49 |
Multilevel security issues in distributed database management systems
|
McHugh, John |
|
1988 |
7 |
4 |
p. 387-396 10 p. |
artikel |
50 |
New video terminal law
|
Highland, Harold Joseph |
|
1988 |
7 |
4 |
p. 340- 1 p. |
artikel |
51 |
New virus damaging mac data, group says
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 425- 1 p. |
artikel |
52 |
NSA regs hinder inexpensive network security
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 431- 1 p. |
artikel |
53 |
OMB advocates control model for systems security
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 427-428 2 p. |
artikel |
54 |
On the privacy afforded by adaptive text compression
|
Witten, Ian H. |
|
1988 |
7 |
4 |
p. 397-408 12 p. |
artikel |
55 |
Operating system is weak link in MVS security
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 430-431 2 p. |
artikel |
56 |
Picking encryption method is no time for secrets
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 431- 1 p. |
artikel |
57 |
Planning averts disaster at L.A. Bond trading firm
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 432- 1 p. |
artikel |
58 |
Potential applications of knowledge-based methods to computer security
|
Summers, Rita C. |
|
1988 |
7 |
4 |
p. 373-385 13 p. |
artikel |
59 |
Problems in auditing expert system development
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 428- 1 p. |
artikel |
60 |
Proper procedures are final security safeguard
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 431- 1 p. |
artikel |
61 |
Reliance on optical fibres to increase telecommunication security
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 424- 1 p. |
artikel |
62 |
Risk! The third factor
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 429- 1 p. |
artikel |
63 |
Security concerns in a local area network environment
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 428- 1 p. |
artikel |
64 |
Security expert gives advice on computer viruses
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 425-426 2 p. |
artikel |
65 |
Security habits build healthy software
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 426-427 2 p. |
artikel |
66 |
Security, OSI and distributed systems
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 424- 1 p. |
artikel |
67 |
Security problems greater than ever
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 429- 1 p. |
artikel |
68 |
Selection risks in hiring information systems personnel
|
Bologna, Jack |
|
1988 |
7 |
4 |
p. 353-355 3 p. |
artikel |
69 |
Smart cards: A new tool for identification and access protection
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 424- 1 p. |
artikel |
70 |
SPA cracks down on piracy, raids computer retailer
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 428- 1 p. |
artikel |
71 |
Speakers say employee attitude is key to security
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 432- 1 p. |
artikel |
72 |
Spread of computer viruses worries users
|
|
|
1988 |
7 |
4 |
p. 427- 1 p. |
artikel |
73 |
Stalking the Wily Hacker
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 429- 1 p. |
artikel |
74 |
Taming the indoor elements
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 432- 1 p. |
artikel |
75 |
Technology makes security of voice and data against sabotage both effective and affordable
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 432- 1 p. |
artikel |
76 |
The anatomy of a DOS Disk
|
Highland, Harold Joseph |
|
1988 |
7 |
4 |
p. 357-360 4 p. |
artikel |
77 |
The brain virus: Fact and fantasy
|
Highland, Harold Joseph |
|
1988 |
7 |
4 |
p. 367-370 4 p. |
artikel |
78 |
The executives guide to workstation management and data security
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 424-425 2 p. |
artikel |
79 |
The hype behind computer viruses: Their bark may be worse than their “byte”
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 427- 1 p. |
artikel |
80 |
The world meganetwork and terrorism
|
Madsen, C. Wayne |
|
1988 |
7 |
4 |
p. 347-352 6 p. |
artikel |
81 |
Tips on terrorism
|
Highland, Harold Joseph |
|
1988 |
7 |
4 |
p. 344- 1 p. |
artikel |
82 |
Top secret, and vulnerable
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 430- 1 p. |
artikel |
83 |
Tough countermeasures thwart hackers who attack vital data
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 429-430 2 p. |
artikel |
84 |
Two secure file servers
|
Cohen, Fred |
|
1988 |
7 |
4 |
p. 409-414 6 p. |
artikel |
85 |
UFS: User-friendly security
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 424- 1 p. |
artikel |
86 |
Unix system security issues
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 424- 1 p. |
artikel |
87 |
U.S. Government agencies belatedly address information system security issues
|
Menkus, Belden |
|
1988 |
7 |
4 |
p. 361-366 6 p. |
artikel |
88 |
Viruses infect corporate MIS
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 427- 1 p. |
artikel |
89 |
Virus filter update
|
Highland, Harold Joseph |
|
1988 |
7 |
4 |
p. 345- 1 p. |
artikel |
90 |
Virus-plagued user warned of snake-oil pitch
|
Highland, Esther H. |
|
1988 |
7 |
4 |
p. 427- 1 p. |
artikel |
91 |
World-wide reports on developments in computer security
|
|
|
1988 |
7 |
4 |
p. 417-422 6 p. |
artikel |