Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             91 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Addresses of publications 1988
7 4 p. 433-
1 p.
artikel
2 Agencies fail to appreciate threat to data security Highland, Esther H.
1988
7 4 p. 430-
1 p.
artikel
3 Agencies ready forces for data security campaign Highland, Esther H.
1988
7 4 p. 424-
1 p.
artikel
4 A nasty bug Highland, Esther H.
1988
7 4 p. 425-
1 p.
artikel
5 Apple files response to Microsoft's countersuit Highland, Esther H.
1988
7 4 p. 423-
1 p.
artikel
6 Apple-Microsoft suit raises issue of vague copyright laws Highland, Esther H.
1988
7 4 p. 423-
1 p.
artikel
7 Apple/Microsoft suit split in two Highland, Esther H.
1988
7 4 p. 423-
1 p.
artikel
8 Apple releases “anti-viral” program Highland, Esther H.
1988
7 4 p. 426-
1 p.
artikel
9 A redundancy reducing cipher Highland, Esther H.
1988
7 4 p. 431-432
2 p.
artikel
10 Are virus attack statistics reliable? Highland, Harold Joseph
1988
7 4 p. 338-
1 p.
artikel
11 Breach reported in U.S. computers Highland, Esther H.
1988
7 4 p. 428-429
2 p.
artikel
12 Calendar 1988
7 4 p. 435-
1 p.
artikel
13 Can we trust computers? Highland, Esther H.
1988
7 4 p. 425-
1 p.
artikel
14 Computer insecurity Highland, Esther H.
1988
7 4 p. 424-
1 p.
artikel
15 Computer systems need isolated ground that is safe and noise free Highland, Esther H.
1988
7 4 p. 432-433
2 p.
artikel
16 Computer viruses can infect entire organizations Highland, Esther H.
1988
7 4 p. 426-
1 p.
artikel
17 Confronting the growing threat of harmful computer software viruses Highland, Esther H.
1988
7 4 p. 427-
1 p.
artikel
18 Despite regs, most agencies lack disaster plan Highland, Esther H.
1988
7 4 p. 431-
1 p.
artikel
19 Dispute over mac user interface longstanding Highland, Esther H.
1988
7 4 p. 423-
1 p.
artikel
20 Electromagnetic eavesdropping machines for christmas? Highland, Harold Joseph
1988
7 4 p. 341-
1 p.
artikel
21 Ethical issues in computer virus distribution Cohen, Frederick
1988
7 4 p. 335-336
2 p.
artikel
22 Federal officials puzzled by computer virus attacks Highland, Esther H.
1988
7 4 p. 426-
1 p.
artikel
23 Fire KOs Chicago networks Highland, Esther H.
1988
7 4 p. 432-
1 p.
artikel
24 Footnote 1988
7 4 p. 346-
1 p.
artikel
25 From the editor Highland, Harold Joseph
1988
7 4 p. 334-
1 p.
artikel
26 Hackers revisited Highland, Harold Joseph
1988
7 4 p. 339-
1 p.
artikel
27 How much is enough? Expert says security efforts should pay, not cost Highland, Esther H.
1988
7 4 p. 428-
1 p.
artikel
28 How safe is your data Highland, Esther H.
1988
7 4 p. 428-
1 p.
artikel
29 How to obtain a computer virus Highland, Harold Joseph
1988
7 4 p. 337-
1 p.
artikel
30 How vaccine programs work Highland, Esther H.
1988
7 4 p. 427-
1 p.
artikel
31 IFIP technical committee 11 1988
7 4 p. 415-416
2 p.
artikel
32 Information technology and dataveillance Highland, Esther H.
1988
7 4 p. 433-
1 p.
artikel
33 Insurance and the hacker Highland, Esther H.
1988
7 4 p. 425-
1 p.
artikel
34 International board of referees 1988
7 4 p. 371-372
2 p.
artikel
35 Investigating a reported virus attack Highland, Harold Joseph
1988
7 4 p. 344-345
2 p.
artikel
36 It can't happen here Highland, Esther H.
1988
7 4 p. 428-
1 p.
artikel
37 LAN security problem detected on Navy ships Highland, Esther H.
1988
7 4 p. 430-
1 p.
artikel
38 Loose MIPS sink ships Highland, Esther H.
1988
7 4 p. 430-
1 p.
artikel
39 Lotus removes 1-2-3 protection Highland, Esther H.
1988
7 4 p. 432-
1 p.
artikel
40 Macintosh virus seeks EDS signatures Highland, Esther H.
1988
7 4 p. 426-
1 p.
artikel
41 Mac virus discovered at EPA, vaccination called successful Highland, Esther H.
1988
7 4 p. 426-
1 p.
artikel
42 Mac virus surfaces in Washington Highland, Esther H.
1988
7 4 p. 425-
1 p.
artikel
43 MBS, OPM officials plan broad security guidelines Highland, Esther H.
1988
7 4 p. 423-424
2 p.
artikel
44 Media security Highland, Esther H.
1988
7 4 p. 425-
1 p.
artikel
45 Micro security system effective even on laptops Highland, Esther H.
1988
7 4 p. 431-
1 p.
artikel
46 Microsoft charges apple with breach of contract Highland, Esther H.
1988
7 4 p. 423-
1 p.
artikel
47 Microsoft seeks to split Apple suit into two phases Highland, Esther H.
1988
7 4 p. 423-
1 p.
artikel
48 Monitoring points out weak spots Highland, Esther H.
1988
7 4 p. 429-
1 p.
artikel
49 Multilevel security issues in distributed database management systems McHugh, John
1988
7 4 p. 387-396
10 p.
artikel
50 New video terminal law Highland, Harold Joseph
1988
7 4 p. 340-
1 p.
artikel
51 New virus damaging mac data, group says Highland, Esther H.
1988
7 4 p. 425-
1 p.
artikel
52 NSA regs hinder inexpensive network security Highland, Esther H.
1988
7 4 p. 431-
1 p.
artikel
53 OMB advocates control model for systems security Highland, Esther H.
1988
7 4 p. 427-428
2 p.
artikel
54 On the privacy afforded by adaptive text compression Witten, Ian H.
1988
7 4 p. 397-408
12 p.
artikel
55 Operating system is weak link in MVS security Highland, Esther H.
1988
7 4 p. 430-431
2 p.
artikel
56 Picking encryption method is no time for secrets Highland, Esther H.
1988
7 4 p. 431-
1 p.
artikel
57 Planning averts disaster at L.A. Bond trading firm Highland, Esther H.
1988
7 4 p. 432-
1 p.
artikel
58 Potential applications of knowledge-based methods to computer security Summers, Rita C.
1988
7 4 p. 373-385
13 p.
artikel
59 Problems in auditing expert system development Highland, Esther H.
1988
7 4 p. 428-
1 p.
artikel
60 Proper procedures are final security safeguard Highland, Esther H.
1988
7 4 p. 431-
1 p.
artikel
61 Reliance on optical fibres to increase telecommunication security Highland, Esther H.
1988
7 4 p. 424-
1 p.
artikel
62 Risk! The third factor Highland, Esther H.
1988
7 4 p. 429-
1 p.
artikel
63 Security concerns in a local area network environment Highland, Esther H.
1988
7 4 p. 428-
1 p.
artikel
64 Security expert gives advice on computer viruses Highland, Esther H.
1988
7 4 p. 425-426
2 p.
artikel
65 Security habits build healthy software Highland, Esther H.
1988
7 4 p. 426-427
2 p.
artikel
66 Security, OSI and distributed systems Highland, Esther H.
1988
7 4 p. 424-
1 p.
artikel
67 Security problems greater than ever Highland, Esther H.
1988
7 4 p. 429-
1 p.
artikel
68 Selection risks in hiring information systems personnel Bologna, Jack
1988
7 4 p. 353-355
3 p.
artikel
69 Smart cards: A new tool for identification and access protection Highland, Esther H.
1988
7 4 p. 424-
1 p.
artikel
70 SPA cracks down on piracy, raids computer retailer Highland, Esther H.
1988
7 4 p. 428-
1 p.
artikel
71 Speakers say employee attitude is key to security Highland, Esther H.
1988
7 4 p. 432-
1 p.
artikel
72 Spread of computer viruses worries users 1988
7 4 p. 427-
1 p.
artikel
73 Stalking the Wily Hacker Highland, Esther H.
1988
7 4 p. 429-
1 p.
artikel
74 Taming the indoor elements Highland, Esther H.
1988
7 4 p. 432-
1 p.
artikel
75 Technology makes security of voice and data against sabotage both effective and affordable Highland, Esther H.
1988
7 4 p. 432-
1 p.
artikel
76 The anatomy of a DOS Disk Highland, Harold Joseph
1988
7 4 p. 357-360
4 p.
artikel
77 The brain virus: Fact and fantasy Highland, Harold Joseph
1988
7 4 p. 367-370
4 p.
artikel
78 The executives guide to workstation management and data security Highland, Esther H.
1988
7 4 p. 424-425
2 p.
artikel
79 The hype behind computer viruses: Their bark may be worse than their “byte” Highland, Esther H.
1988
7 4 p. 427-
1 p.
artikel
80 The world meganetwork and terrorism Madsen, C. Wayne
1988
7 4 p. 347-352
6 p.
artikel
81 Tips on terrorism Highland, Harold Joseph
1988
7 4 p. 344-
1 p.
artikel
82 Top secret, and vulnerable Highland, Esther H.
1988
7 4 p. 430-
1 p.
artikel
83 Tough countermeasures thwart hackers who attack vital data Highland, Esther H.
1988
7 4 p. 429-430
2 p.
artikel
84 Two secure file servers Cohen, Fred
1988
7 4 p. 409-414
6 p.
artikel
85 UFS: User-friendly security Highland, Esther H.
1988
7 4 p. 424-
1 p.
artikel
86 Unix system security issues Highland, Esther H.
1988
7 4 p. 424-
1 p.
artikel
87 U.S. Government agencies belatedly address information system security issues Menkus, Belden
1988
7 4 p. 361-366
6 p.
artikel
88 Viruses infect corporate MIS Highland, Esther H.
1988
7 4 p. 427-
1 p.
artikel
89 Virus filter update Highland, Harold Joseph
1988
7 4 p. 345-
1 p.
artikel
90 Virus-plagued user warned of snake-oil pitch Highland, Esther H.
1988
7 4 p. 427-
1 p.
artikel
91 World-wide reports on developments in computer security 1988
7 4 p. 417-422
6 p.
artikel
                             91 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland