nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access control methods of VAX/VMS
|
Reisinger, David A. |
|
1988 |
7 |
5 |
p. 524- 1 p. |
artikel |
2 |
Access-control software
|
Friedman, Michael |
|
1988 |
7 |
5 |
p. 523- 1 p. |
artikel |
3 |
A context for information systems security planning
|
Wood, Charles Cresson |
|
1988 |
7 |
5 |
p. 455-465 11 p. |
artikel |
4 |
Addresses of publications
|
|
|
1988 |
7 |
5 |
p. 528- 1 p. |
artikel |
5 |
Air force mounts offensive against computer crime
|
Munro, Neil |
|
1988 |
7 |
5 |
p. 525- 1 p. |
artikel |
6 |
Analysis of individual risk belief structures
|
Tonn, B.E. |
|
1988 |
7 |
5 |
p. 509-510 2 p. |
artikel |
7 |
Annotated bibliography on software maintenance
|
Osborne, W.M. |
|
1988 |
7 |
5 |
p. 516- 1 p. |
artikel |
8 |
Apple property rights suit can backfire
|
Richman, Sheldon L. |
|
1988 |
7 |
5 |
p. 521-522 2 p. |
artikel |
9 |
Approach your hot site as home away from home
|
Scisco, Peter |
|
1988 |
7 |
5 |
p. 526- 1 p. |
artikel |
10 |
A transaction flow approach to software security certification for document handling systems
|
Pfleeger, Charles P. |
|
1988 |
7 |
5 |
p. 495-502 8 p. |
artikel |
11 |
Begin contingency planning or you might become an outlaw
|
Sherizen, Sanford |
|
1988 |
7 |
5 |
p. 525-526 2 p. |
artikel |
12 |
Bill to regulate data matching moves to floor
|
Grimm, Vanessa Jo |
|
1988 |
7 |
5 |
p. 521- 1 p. |
artikel |
13 |
Biometrics: The future in security methods?
|
Bakst, Shelley |
|
1988 |
7 |
5 |
p. 526- 1 p. |
artikel |
14 |
Calendar
|
|
|
1988 |
7 |
5 |
p. 530- 1 p. |
artikel |
15 |
Central computer facility software directory
|
Kimball, Mary C. |
|
1988 |
7 |
5 |
p. 515- 1 p. |
artikel |
16 |
Checking out your security system
|
Avarne, Simon |
|
1988 |
7 |
5 |
p. 525- 1 p. |
artikel |
17 |
Computer communications software. January 1975– October 1986
|
|
|
1988 |
7 |
5 |
p. 519-520 2 p. |
artikel |
18 |
Computer communications software. November 1986– September 1987
|
|
|
1988 |
7 |
5 |
p. 520- 1 p. |
artikel |
19 |
Computer crime. January 1975–October 1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)
|
|
|
1988 |
7 |
5 |
p. 513- 1 p. |
artikel |
20 |
Computer crime. November 1986–October 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)
|
|
|
1988 |
7 |
5 |
p. 513- 1 p. |
artikel |
21 |
Computer disasters: Prevention and recovery. 1975–September 1986 (Citations from the INSPEC: Information Services for the Physics and Engineering Communities Database)
|
|
|
1988 |
7 |
5 |
p. 510- 1 p. |
artikel |
22 |
Computer “Hackers” viewed as a threat to phone security
|
Markoff, John |
|
1988 |
7 |
5 |
p. 526- 1 p. |
artikel |
23 |
Computer information security and protection. June 1985– April 1987 (Citations from the NTIS database)
|
|
|
1988 |
7 |
5 |
p. 509- 1 p. |
artikel |
24 |
Computer information security and protection. November 1986–October 1987
|
|
|
1988 |
7 |
5 |
p. 511- 1 p. |
artikel |
25 |
Computer network standards. 1975–February 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)
|
|
|
1988 |
7 |
5 |
p. 514-515 2 p. |
artikel |
26 |
Computer performance evaluation. July 1983–April 1988 (citations from the NTIS database)
|
|
|
1988 |
7 |
5 |
p. 511- 1 p. |
artikel |
27 |
Computer software maintenance. January 1970– August 1987
|
|
|
1988 |
7 |
5 |
p. 518- 1 p. |
artikel |
28 |
Computer software transferability and portability. January 1970–August 1987
|
|
|
1988 |
7 |
5 |
p. 518- 1 p. |
artikel |
29 |
Computer viruses: Media hyperbole, errors and ignorance
|
Highland, Harold Joseph |
|
1988 |
7 |
5 |
p. 442-450 9 p. |
artikel |
30 |
Computer viruses strike colleges and companies, leaving them defensive
|
Bridges, Linda |
|
1988 |
7 |
5 |
p. 522- 1 p. |
artikel |
31 |
Computer voice recognition: Market aspects. January 1983– July 1987
|
|
|
1988 |
7 |
5 |
p. 518- 1 p. |
artikel |
32 |
Congestion control in routing networks
|
Chien, A.A. |
|
1988 |
7 |
5 |
p. 515- 1 p. |
artikel |
33 |
CONST—a constructive approach to information modelling
|
Lundberg, B.G. |
|
1988 |
7 |
5 |
p. 514- 1 p. |
artikel |
34 |
Copyright issue blurs
|
Lewis, Brenda D. |
|
1988 |
7 |
5 |
p. 522- 1 p. |
artikel |
35 |
Cryptography and cryptosystems. January 1987– December 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)
|
|
|
1988 |
7 |
5 |
p. 518- 1 p. |
artikel |
36 |
Cryptography and cryptosystems. January 1970– October 1987
|
|
|
1988 |
7 |
5 |
p. 519- 1 p. |
artikel |
37 |
Cryptology and VLSI (Very Large Scale Integration). I. Detecting and exploiting algebraic weaknesses in cryptosystems. II. Algorithms for placing modules on a custom VLSI chip
|
Sherman, A.T. |
|
1988 |
7 |
5 |
p. 512- 1 p. |
artikel |
38 |
Curing back-up blues
|
Alper, Alan |
|
1988 |
7 |
5 |
p. 524- 1 p. |
artikel |
39 |
Data acquisition, reduction, and analysis using a microcomputer
|
Allen, Bruce M. |
|
1988 |
7 |
5 |
p. 513- 1 p. |
artikel |
40 |
Data compression: Techniques and applications. October 1983–September 1986
|
|
|
1988 |
7 |
5 |
p. 518- 1 p. |
artikel |
41 |
Data compression: Techniques and applications. October 1986–September 1987
|
|
|
1988 |
7 |
5 |
p. 519- 1 p. |
artikel |
42 |
Data compression: Techniques and applications. October 1983–September 1986
|
|
|
1988 |
7 |
5 |
p. 519- 1 p. |
artikel |
43 |
Data encryption standard. 1975–January 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities Database)
|
|
|
1988 |
7 |
5 |
p. 511- 1 p. |
artikel |
44 |
Data Encryption Standard. January 1975–January 1988 (citations from the INSPEC: Information Services for the Physics and Engineering Communications Database)
|
|
|
1988 |
7 |
5 |
p. 511- 1 p. |
artikel |
45 |
Data quality: A strategic perspective
|
Snyder, C.E. |
|
1988 |
7 |
5 |
p. 514- 1 p. |
artikel |
46 |
DES (Data Encryption Standard) cryptographic services designed for the DOE wide band communications network
|
Burnham, B. |
|
1988 |
7 |
5 |
p. 510- 1 p. |
artikel |
47 |
Design of a real time operating system for a fault tolerant microcomputer
|
Voigt, R.J. |
|
1988 |
7 |
5 |
p. 518- 1 p. |
artikel |
48 |
Directory of computerized data files, 1987
|
|
|
1988 |
7 |
5 |
p. 519- 1 p. |
artikel |
49 |
ELAND: An expert system for the configuration of local area networks applications
|
Tanca, L. |
|
1988 |
7 |
5 |
p. 514- 1 p. |
artikel |
50 |
Ethernet communication networks. 1978–1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)
|
|
|
1988 |
7 |
5 |
p. 515- 1 p. |
artikel |
51 |
Expert system for software quality assurance
|
Baum, William E. |
|
1988 |
7 |
5 |
p. 512- 1 p. |
artikel |
52 |
Expert systems: Non-industrial applications. January 1984–March 1987
|
|
|
1988 |
7 |
5 |
p. 519- 1 p. |
artikel |
53 |
Few data centers planning for the big one
|
Martin, James A. |
|
1988 |
7 |
5 |
p. 527- 1 p. |
artikel |
54 |
From the editor
|
Highland, Harold Joseph |
|
1988 |
7 |
5 |
p. 438- 1 p. |
artikel |
55 |
Government beefs up internal data security
|
Bermar, Amy |
|
1988 |
7 |
5 |
p. 525- 1 p. |
artikel |
56 |
Guidance on software package selection
|
Frankel, S. |
|
1988 |
7 |
5 |
p. 515- 1 p. |
artikel |
57 |
Guidelines for preparing software user documentation
|
Miller, D.F. |
|
1988 |
7 |
5 |
p. 517- 1 p. |
artikel |
58 |
Hacker accesses DOD network
|
Leong, Kathy Chin |
|
1988 |
7 |
5 |
p. 524-525 2 p. |
artikel |
59 |
Handwriting recognition by computer. January 1970– August 1987
|
|
|
1988 |
7 |
5 |
p. 518- 1 p. |
artikel |
60 |
Hill might punish security lapses
|
Power, Kevin |
|
1988 |
7 |
5 |
p. 526- 1 p. |
artikel |
61 |
H-P countersues apple
|
Goff, Leslie |
|
1988 |
7 |
5 |
p. 521- 1 p. |
artikel |
62 |
IC card with a microprocessor
|
|
|
1988 |
7 |
5 |
p. 519- 1 p. |
artikel |
63 |
IFIP Technical Committee 11
|
|
|
1988 |
7 |
5 |
p. 507-508 2 p. |
artikel |
64 |
Implementing the RSA cryptosystem
|
Jung, A. |
|
1988 |
7 |
5 |
p. 510-511 2 p. |
artikel |
65 |
Industry praises copyright decision
|
Parker, Rachel |
|
1988 |
7 |
5 |
p. 521- 1 p. |
artikel |
66 |
Informationstechnik aus der sicht der benutzer im wandel des letzten jahrezehnts (Information technology from the point of the user during the last decade)
|
Mueller-Boeling, D. |
|
1988 |
7 |
5 |
p. 516- 1 p. |
artikel |
67 |
Information theory and public key cryptosystems
|
Gaglione, A.M. |
|
1988 |
7 |
5 |
p. 511- 1 p. |
artikel |
68 |
Innovative workstation
|
Villarreal, J. |
|
1988 |
7 |
5 |
p. 512- 1 p. |
artikel |
69 |
Intellectual property rights in an age of electronics and information. Contractor documents. Volume 2
|
|
|
1988 |
7 |
5 |
p. 513- 1 p. |
artikel |
70 |
Intellectual property rights in an age of electronics and information. Contractor documents. Volume 1
|
|
|
1988 |
7 |
5 |
p. 512- 1 p. |
artikel |
71 |
International board of referees
|
|
|
1988 |
7 |
5 |
p. 473-474 2 p. |
artikel |
72 |
Latest GAO security study has flaws of its own
|
Houser, Walter R. |
|
1988 |
7 |
5 |
p. 527- 1 p. |
artikel |
73 |
Local area networks. January 1986–December 1986 (citations from the engineering index database)
|
|
|
1988 |
7 |
5 |
p. 515- 1 p. |
artikel |
74 |
“Look-and-feel” decision looms
|
Byles, Torrey |
|
1988 |
7 |
5 |
p. 521- 1 p. |
artikel |
75 |
Maintaining a poor person's information integrity
|
Cohen, Fred |
|
1988 |
7 |
5 |
p. 489-494 6 p. |
artikel |
76 |
Make security a priority at start of LAN installation
|
Sherizan, Sanford |
|
1988 |
7 |
5 |
p. 525- 1 p. |
artikel |
77 |
Management overview of software reuse
|
Wong, W. |
|
1988 |
7 |
5 |
p. 516- 1 p. |
artikel |
78 |
Managing the data analysis process
|
Nicholson, W.L. |
|
1988 |
7 |
5 |
p. 516- 1 p. |
artikel |
79 |
Microcomputer modems. 1975– February 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)
|
|
|
1988 |
7 |
5 |
p. 514- 1 p. |
artikel |
80 |
Microcomputers: Data and software security. 1974– February 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)
|
|
|
1988 |
7 |
5 |
p. 512- 1 p. |
artikel |
81 |
Microcomputer security issues in an office environment
|
Zaritsky, I.S. |
|
1988 |
7 |
5 |
p. 509- 1 p. |
artikel |
82 |
Microcomputer to mainframe links. January 1975–February 1988 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)
|
|
|
1988 |
7 |
5 |
p. 512- 1 p. |
artikel |
83 |
Microsoft, H-P shrug off apple suit
|
Jones, Stephen |
|
1988 |
7 |
5 |
p. 521- 1 p. |
artikel |
84 |
$3 million computer security plan
|
Markoff, John |
|
1988 |
7 |
5 |
p. 527- 1 p. |
artikel |
85 |
Most DOD computers to meet C-2 security by '92
|
Munro, Neil |
|
1988 |
7 |
5 |
p. 527- 1 p. |
artikel |
86 |
National survey of worksite health promotion programs, 1985
|
Kiefhaber, A. |
|
1988 |
7 |
5 |
p. 517- 1 p. |
artikel |
87 |
Neutral computers, auditing and security
|
|
|
1988 |
7 |
5 |
p. 520- 1 p. |
artikel |
88 |
No vaccine to ward off effects of virus attacks
|
Menkus, Belden |
|
1988 |
7 |
5 |
p. 523- 1 p. |
artikel |
89 |
Police chief of Metro-North indicted in computer misuse
|
Raab, Selwyn |
|
1988 |
7 |
5 |
p. 522- 1 p. |
artikel |
90 |
Privacy and databases: A question of dignity
|
Dahl, Mary Karen |
|
1988 |
7 |
5 |
p. 527-528 2 p. |
artikel |
91 |
Protection from power gremlins
|
Finn, Judith A. |
|
1988 |
7 |
5 |
p. 524- 1 p. |
artikel |
92 |
Public policy origins of telecommunications privacy and the emerging issues
|
Katz, James E. |
|
1988 |
7 |
5 |
p. 524- 1 p. |
artikel |
93 |
Real-time fault detection and diagnosis: The use of learning expert systems to handle the timing of events
|
Malkoff, D.B. |
|
1988 |
7 |
5 |
p. 513-514 2 p. |
artikel |
94 |
Recovering from a computer virus attack
|
Davis, Frank G.F. |
|
1988 |
7 |
5 |
p. 523- 1 p. |
artikel |
95 |
Recovery using virtual memory
|
Kolodner, E.K. |
|
1988 |
7 |
5 |
p. 517- 1 p. |
artikel |
96 |
“Remember to lock the door”: MMI and the Hacker
|
Roberts, William |
|
1988 |
7 |
5 |
p. 523- 1 p. |
artikel |
97 |
Risk Assessment Methodology for Software Supportability (RAMSS): User's handbook
|
Peercy, D.E. |
|
1988 |
7 |
5 |
p. 510- 1 p. |
artikel |
98 |
Sabotage aimed at computer company destroys government data
|
|
|
1988 |
7 |
5 |
p. 522-523 2 p. |
artikel |
99 |
Scent of money lures firms to jump on antiviral bandwagon
|
Parker, Rachel |
|
1988 |
7 |
5 |
p. 523- 1 p. |
artikel |
100 |
Secure software verification tools
|
|
|
1988 |
7 |
5 |
p. 511- 1 p. |
artikel |
101 |
Securing satellite signals
|
Shimabukuro, Tom M. |
|
1988 |
7 |
5 |
p. 524- 1 p. |
artikel |
102 |
Securing the RSA- cryptosystem against cycling attacks
|
Jamnig, Peter |
|
1988 |
7 |
5 |
p. 526-527 2 p. |
artikel |
103 |
Security considerations— defence-related and commercial
|
Braum, H. |
|
1988 |
7 |
5 |
p. 513- 1 p. |
artikel |
104 |
Security in open system networks: A tutorial survey
|
Bayle, Aime J. |
|
1988 |
7 |
5 |
p. 523- 1 p. |
artikel |
105 |
Security news briefs
|
Schweitzer, Jim |
|
1988 |
7 |
5 |
p. 467-469 3 p. |
artikel |
106 |
Smart cards. January 1983– August 1987
|
|
|
1988 |
7 |
5 |
p. 518-519 2 p. |
artikel |
107 |
Software error experiment
|
Holt, H.M. |
|
1988 |
7 |
5 |
p. 517- 1 p. |
artikel |
108 |
Software quality and metrics. January 1975–December 1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)
|
|
|
1988 |
7 |
5 |
p. 517- 1 p. |
artikel |
109 |
Software quality and metrics. January 1987–December 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)
|
|
|
1988 |
7 |
5 |
p. 517-518 2 p. |
artikel |
110 |
Software security and piracy. February 1984–March 1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)
|
|
|
1988 |
7 |
5 |
p. 513- 1 p. |
artikel |
111 |
Software supportability risk assessment in OT&E (Operational Test and Evaluation): Historical baselines for risk profiles. Volumes 1 and 2
|
Peercy, D.E. |
|
1988 |
7 |
5 |
p. 510- 1 p. |
artikel |
112 |
Software Technology for Adaptable, Reliable Systems (STARS) program management plan
|
Greene Jr., Joseph S. |
|
1988 |
7 |
5 |
p. 515- 1 p. |
artikel |
113 |
Software Technology for Adaptable, Reliable Systems (STARS) technical program plan
|
Greene Jr., Joseph S. |
|
1988 |
7 |
5 |
p. 515-516 2 p. |
artikel |
114 |
Solutions to the multidestination secure electronic mail problem
|
Mitchell, Chris |
|
1988 |
7 |
5 |
p. 483-488 6 p. |
artikel |
115 |
Some complexity theory for cryptography
|
Gaglione, A.M. |
|
1988 |
7 |
5 |
p. 519- 1 p. |
artikel |
116 |
Some weak points of one fast cryptographic checksum algorithm and its improvement
|
Yue Jiang Huang, |
|
1988 |
7 |
5 |
p. 503-505 3 p. |
artikel |
117 |
System crash foils swiss bank theft
|
Hunter, Philip |
|
1988 |
7 |
5 |
p. 525- 1 p. |
artikel |
118 |
Testing OSI (Open Systems Interconnection) protocols at the National Bureau of Standards
|
Linn, R.J. |
|
1988 |
7 |
5 |
p. 514- 1 p. |
artikel |
119 |
The case of the “Gerbil virus” that wasn't
|
Glath, Raymond M. |
|
1988 |
7 |
5 |
p. 451-453 3 p. |
artikel |
120 |
The password predictor—a training aid for raising security awareness
|
Carroll, John M. |
|
1988 |
7 |
5 |
p. 475-481 7 p. |
artikel |
121 |
Understanding user attitudes: The cornerstone of computer documentation
|
Hurford, J.M. |
|
1988 |
7 |
5 |
p. 516-517 2 p. |
artikel |
122 |
Unisys Canada slaps $500 K lawsuit on firm
|
Barker, Paul |
|
1988 |
7 |
5 |
p. 522- 1 p. |
artikel |
123 |
U.S. Congress computer virus report
|
Highland, Harold Joseph |
|
1988 |
7 |
5 |
p. 439- 1 p. |
artikel |
124 |
Use of colour on electronic data displays (second study)
|
David, H. |
|
1988 |
7 |
5 |
p. 512- 1 p. |
artikel |
125 |
Using data safes to protect information
|
Rowh, Mark |
|
1988 |
7 |
5 |
p. 527- 1 p. |
artikel |
126 |
Viruses: Should we quit talking about them?
|
Zajac Jr., Bernard P. |
|
1988 |
7 |
5 |
p. 471-472 2 p. |
artikel |
127 |
Virus filter evaluation
|
Highland, Harold Joseph |
|
1988 |
7 |
5 |
p. 440- 1 p. |
artikel |
128 |
Virus filter update
|
Highland, Harold Joseph |
|
1988 |
7 |
5 |
p. 441-442 2 p. |
artikel |
129 |
Wider threat to privacy seen as computer memories grow
|
Markoff, John |
|
1988 |
7 |
5 |
p. 524- 1 p. |
artikel |
130 |
Workstation/mainframe connection
|
Requa, J. |
|
1988 |
7 |
5 |
p. 517- 1 p. |
artikel |
131 |
Write-protect tab warning
|
Highland, Harold Joseph |
|
1988 |
7 |
5 |
p. 439- 1 p. |
artikel |