Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             131 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Access control methods of VAX/VMS Reisinger, David A.
1988
7 5 p. 524-
1 p.
artikel
2 Access-control software Friedman, Michael
1988
7 5 p. 523-
1 p.
artikel
3 A context for information systems security planning Wood, Charles Cresson
1988
7 5 p. 455-465
11 p.
artikel
4 Addresses of publications 1988
7 5 p. 528-
1 p.
artikel
5 Air force mounts offensive against computer crime Munro, Neil
1988
7 5 p. 525-
1 p.
artikel
6 Analysis of individual risk belief structures Tonn, B.E.
1988
7 5 p. 509-510
2 p.
artikel
7 Annotated bibliography on software maintenance Osborne, W.M.
1988
7 5 p. 516-
1 p.
artikel
8 Apple property rights suit can backfire Richman, Sheldon L.
1988
7 5 p. 521-522
2 p.
artikel
9 Approach your hot site as home away from home Scisco, Peter
1988
7 5 p. 526-
1 p.
artikel
10 A transaction flow approach to software security certification for document handling systems Pfleeger, Charles P.
1988
7 5 p. 495-502
8 p.
artikel
11 Begin contingency planning or you might become an outlaw Sherizen, Sanford
1988
7 5 p. 525-526
2 p.
artikel
12 Bill to regulate data matching moves to floor Grimm, Vanessa Jo
1988
7 5 p. 521-
1 p.
artikel
13 Biometrics: The future in security methods? Bakst, Shelley
1988
7 5 p. 526-
1 p.
artikel
14 Calendar 1988
7 5 p. 530-
1 p.
artikel
15 Central computer facility software directory Kimball, Mary C.
1988
7 5 p. 515-
1 p.
artikel
16 Checking out your security system Avarne, Simon
1988
7 5 p. 525-
1 p.
artikel
17 Computer communications software. January 1975– October 1986 1988
7 5 p. 519-520
2 p.
artikel
18 Computer communications software. November 1986– September 1987 1988
7 5 p. 520-
1 p.
artikel
19 Computer crime. January 1975–October 1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) 1988
7 5 p. 513-
1 p.
artikel
20 Computer crime. November 1986–October 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) 1988
7 5 p. 513-
1 p.
artikel
21 Computer disasters: Prevention and recovery. 1975–September 1986 (Citations from the INSPEC: Information Services for the Physics and Engineering Communities Database) 1988
7 5 p. 510-
1 p.
artikel
22 Computer “Hackers” viewed as a threat to phone security Markoff, John
1988
7 5 p. 526-
1 p.
artikel
23 Computer information security and protection. June 1985– April 1987 (Citations from the NTIS database) 1988
7 5 p. 509-
1 p.
artikel
24 Computer information security and protection. November 1986–October 1987 1988
7 5 p. 511-
1 p.
artikel
25 Computer network standards. 1975–February 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) 1988
7 5 p. 514-515
2 p.
artikel
26 Computer performance evaluation. July 1983–April 1988 (citations from the NTIS database) 1988
7 5 p. 511-
1 p.
artikel
27 Computer software maintenance. January 1970– August 1987 1988
7 5 p. 518-
1 p.
artikel
28 Computer software transferability and portability. January 1970–August 1987 1988
7 5 p. 518-
1 p.
artikel
29 Computer viruses: Media hyperbole, errors and ignorance Highland, Harold Joseph
1988
7 5 p. 442-450
9 p.
artikel
30 Computer viruses strike colleges and companies, leaving them defensive Bridges, Linda
1988
7 5 p. 522-
1 p.
artikel
31 Computer voice recognition: Market aspects. January 1983– July 1987 1988
7 5 p. 518-
1 p.
artikel
32 Congestion control in routing networks Chien, A.A.
1988
7 5 p. 515-
1 p.
artikel
33 CONST—a constructive approach to information modelling Lundberg, B.G.
1988
7 5 p. 514-
1 p.
artikel
34 Copyright issue blurs Lewis, Brenda D.
1988
7 5 p. 522-
1 p.
artikel
35 Cryptography and cryptosystems. January 1987– December 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) 1988
7 5 p. 518-
1 p.
artikel
36 Cryptography and cryptosystems. January 1970– October 1987 1988
7 5 p. 519-
1 p.
artikel
37 Cryptology and VLSI (Very Large Scale Integration). I. Detecting and exploiting algebraic weaknesses in cryptosystems. II. Algorithms for placing modules on a custom VLSI chip Sherman, A.T.
1988
7 5 p. 512-
1 p.
artikel
38 Curing back-up blues Alper, Alan
1988
7 5 p. 524-
1 p.
artikel
39 Data acquisition, reduction, and analysis using a microcomputer Allen, Bruce M.
1988
7 5 p. 513-
1 p.
artikel
40 Data compression: Techniques and applications. October 1983–September 1986 1988
7 5 p. 518-
1 p.
artikel
41 Data compression: Techniques and applications. October 1986–September 1987 1988
7 5 p. 519-
1 p.
artikel
42 Data compression: Techniques and applications. October 1983–September 1986 1988
7 5 p. 519-
1 p.
artikel
43 Data encryption standard. 1975–January 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities Database) 1988
7 5 p. 511-
1 p.
artikel
44 Data Encryption Standard. January 1975–January 1988 (citations from the INSPEC: Information Services for the Physics and Engineering Communications Database) 1988
7 5 p. 511-
1 p.
artikel
45 Data quality: A strategic perspective Snyder, C.E.
1988
7 5 p. 514-
1 p.
artikel
46 DES (Data Encryption Standard) cryptographic services designed for the DOE wide band communications network Burnham, B.
1988
7 5 p. 510-
1 p.
artikel
47 Design of a real time operating system for a fault tolerant microcomputer Voigt, R.J.
1988
7 5 p. 518-
1 p.
artikel
48 Directory of computerized data files, 1987 1988
7 5 p. 519-
1 p.
artikel
49 ELAND: An expert system for the configuration of local area networks applications Tanca, L.
1988
7 5 p. 514-
1 p.
artikel
50 Ethernet communication networks. 1978–1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) 1988
7 5 p. 515-
1 p.
artikel
51 Expert system for software quality assurance Baum, William E.
1988
7 5 p. 512-
1 p.
artikel
52 Expert systems: Non-industrial applications. January 1984–March 1987 1988
7 5 p. 519-
1 p.
artikel
53 Few data centers planning for the big one Martin, James A.
1988
7 5 p. 527-
1 p.
artikel
54 From the editor Highland, Harold Joseph
1988
7 5 p. 438-
1 p.
artikel
55 Government beefs up internal data security Bermar, Amy
1988
7 5 p. 525-
1 p.
artikel
56 Guidance on software package selection Frankel, S.
1988
7 5 p. 515-
1 p.
artikel
57 Guidelines for preparing software user documentation Miller, D.F.
1988
7 5 p. 517-
1 p.
artikel
58 Hacker accesses DOD network Leong, Kathy Chin
1988
7 5 p. 524-525
2 p.
artikel
59 Handwriting recognition by computer. January 1970– August 1987 1988
7 5 p. 518-
1 p.
artikel
60 Hill might punish security lapses Power, Kevin
1988
7 5 p. 526-
1 p.
artikel
61 H-P countersues apple Goff, Leslie
1988
7 5 p. 521-
1 p.
artikel
62 IC card with a microprocessor 1988
7 5 p. 519-
1 p.
artikel
63 IFIP Technical Committee 11 1988
7 5 p. 507-508
2 p.
artikel
64 Implementing the RSA cryptosystem Jung, A.
1988
7 5 p. 510-511
2 p.
artikel
65 Industry praises copyright decision Parker, Rachel
1988
7 5 p. 521-
1 p.
artikel
66 Informationstechnik aus der sicht der benutzer im wandel des letzten jahrezehnts (Information technology from the point of the user during the last decade) Mueller-Boeling, D.
1988
7 5 p. 516-
1 p.
artikel
67 Information theory and public key cryptosystems Gaglione, A.M.
1988
7 5 p. 511-
1 p.
artikel
68 Innovative workstation Villarreal, J.
1988
7 5 p. 512-
1 p.
artikel
69 Intellectual property rights in an age of electronics and information. Contractor documents. Volume 2 1988
7 5 p. 513-
1 p.
artikel
70 Intellectual property rights in an age of electronics and information. Contractor documents. Volume 1 1988
7 5 p. 512-
1 p.
artikel
71 International board of referees 1988
7 5 p. 473-474
2 p.
artikel
72 Latest GAO security study has flaws of its own Houser, Walter R.
1988
7 5 p. 527-
1 p.
artikel
73 Local area networks. January 1986–December 1986 (citations from the engineering index database) 1988
7 5 p. 515-
1 p.
artikel
74 “Look-and-feel” decision looms Byles, Torrey
1988
7 5 p. 521-
1 p.
artikel
75 Maintaining a poor person's information integrity Cohen, Fred
1988
7 5 p. 489-494
6 p.
artikel
76 Make security a priority at start of LAN installation Sherizan, Sanford
1988
7 5 p. 525-
1 p.
artikel
77 Management overview of software reuse Wong, W.
1988
7 5 p. 516-
1 p.
artikel
78 Managing the data analysis process Nicholson, W.L.
1988
7 5 p. 516-
1 p.
artikel
79 Microcomputer modems. 1975– February 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) 1988
7 5 p. 514-
1 p.
artikel
80 Microcomputers: Data and software security. 1974– February 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) 1988
7 5 p. 512-
1 p.
artikel
81 Microcomputer security issues in an office environment Zaritsky, I.S.
1988
7 5 p. 509-
1 p.
artikel
82 Microcomputer to mainframe links. January 1975–February 1988 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) 1988
7 5 p. 512-
1 p.
artikel
83 Microsoft, H-P shrug off apple suit Jones, Stephen
1988
7 5 p. 521-
1 p.
artikel
84 $3 million computer security plan Markoff, John
1988
7 5 p. 527-
1 p.
artikel
85 Most DOD computers to meet C-2 security by '92 Munro, Neil
1988
7 5 p. 527-
1 p.
artikel
86 National survey of worksite health promotion programs, 1985 Kiefhaber, A.
1988
7 5 p. 517-
1 p.
artikel
87 Neutral computers, auditing and security 1988
7 5 p. 520-
1 p.
artikel
88 No vaccine to ward off effects of virus attacks Menkus, Belden
1988
7 5 p. 523-
1 p.
artikel
89 Police chief of Metro-North indicted in computer misuse Raab, Selwyn
1988
7 5 p. 522-
1 p.
artikel
90 Privacy and databases: A question of dignity Dahl, Mary Karen
1988
7 5 p. 527-528
2 p.
artikel
91 Protection from power gremlins Finn, Judith A.
1988
7 5 p. 524-
1 p.
artikel
92 Public policy origins of telecommunications privacy and the emerging issues Katz, James E.
1988
7 5 p. 524-
1 p.
artikel
93 Real-time fault detection and diagnosis: The use of learning expert systems to handle the timing of events Malkoff, D.B.
1988
7 5 p. 513-514
2 p.
artikel
94 Recovering from a computer virus attack Davis, Frank G.F.
1988
7 5 p. 523-
1 p.
artikel
95 Recovery using virtual memory Kolodner, E.K.
1988
7 5 p. 517-
1 p.
artikel
96 “Remember to lock the door”: MMI and the Hacker Roberts, William
1988
7 5 p. 523-
1 p.
artikel
97 Risk Assessment Methodology for Software Supportability (RAMSS): User's handbook Peercy, D.E.
1988
7 5 p. 510-
1 p.
artikel
98 Sabotage aimed at computer company destroys government data 1988
7 5 p. 522-523
2 p.
artikel
99 Scent of money lures firms to jump on antiviral bandwagon Parker, Rachel
1988
7 5 p. 523-
1 p.
artikel
100 Secure software verification tools 1988
7 5 p. 511-
1 p.
artikel
101 Securing satellite signals Shimabukuro, Tom M.
1988
7 5 p. 524-
1 p.
artikel
102 Securing the RSA- cryptosystem against cycling attacks Jamnig, Peter
1988
7 5 p. 526-527
2 p.
artikel
103 Security considerations— defence-related and commercial Braum, H.
1988
7 5 p. 513-
1 p.
artikel
104 Security in open system networks: A tutorial survey Bayle, Aime J.
1988
7 5 p. 523-
1 p.
artikel
105 Security news briefs Schweitzer, Jim
1988
7 5 p. 467-469
3 p.
artikel
106 Smart cards. January 1983– August 1987 1988
7 5 p. 518-519
2 p.
artikel
107 Software error experiment Holt, H.M.
1988
7 5 p. 517-
1 p.
artikel
108 Software quality and metrics. January 1975–December 1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) 1988
7 5 p. 517-
1 p.
artikel
109 Software quality and metrics. January 1987–December 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) 1988
7 5 p. 517-518
2 p.
artikel
110 Software security and piracy. February 1984–March 1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) 1988
7 5 p. 513-
1 p.
artikel
111 Software supportability risk assessment in OT&E (Operational Test and Evaluation): Historical baselines for risk profiles. Volumes 1 and 2 Peercy, D.E.
1988
7 5 p. 510-
1 p.
artikel
112 Software Technology for Adaptable, Reliable Systems (STARS) program management plan Greene Jr., Joseph S.
1988
7 5 p. 515-
1 p.
artikel
113 Software Technology for Adaptable, Reliable Systems (STARS) technical program plan Greene Jr., Joseph S.
1988
7 5 p. 515-516
2 p.
artikel
114 Solutions to the multidestination secure electronic mail problem Mitchell, Chris
1988
7 5 p. 483-488
6 p.
artikel
115 Some complexity theory for cryptography Gaglione, A.M.
1988
7 5 p. 519-
1 p.
artikel
116 Some weak points of one fast cryptographic checksum algorithm and its improvement Yue Jiang Huang,
1988
7 5 p. 503-505
3 p.
artikel
117 System crash foils swiss bank theft Hunter, Philip
1988
7 5 p. 525-
1 p.
artikel
118 Testing OSI (Open Systems Interconnection) protocols at the National Bureau of Standards Linn, R.J.
1988
7 5 p. 514-
1 p.
artikel
119 The case of the “Gerbil virus” that wasn't Glath, Raymond M.
1988
7 5 p. 451-453
3 p.
artikel
120 The password predictor—a training aid for raising security awareness Carroll, John M.
1988
7 5 p. 475-481
7 p.
artikel
121 Understanding user attitudes: The cornerstone of computer documentation Hurford, J.M.
1988
7 5 p. 516-517
2 p.
artikel
122 Unisys Canada slaps $500 K lawsuit on firm Barker, Paul
1988
7 5 p. 522-
1 p.
artikel
123 U.S. Congress computer virus report Highland, Harold Joseph
1988
7 5 p. 439-
1 p.
artikel
124 Use of colour on electronic data displays (second study) David, H.
1988
7 5 p. 512-
1 p.
artikel
125 Using data safes to protect information Rowh, Mark
1988
7 5 p. 527-
1 p.
artikel
126 Viruses: Should we quit talking about them? Zajac Jr., Bernard P.
1988
7 5 p. 471-472
2 p.
artikel
127 Virus filter evaluation Highland, Harold Joseph
1988
7 5 p. 440-
1 p.
artikel
128 Virus filter update Highland, Harold Joseph
1988
7 5 p. 441-442
2 p.
artikel
129 Wider threat to privacy seen as computer memories grow Markoff, John
1988
7 5 p. 524-
1 p.
artikel
130 Workstation/mainframe connection Requa, J.
1988
7 5 p. 517-
1 p.
artikel
131 Write-protect tab warning Highland, Harold Joseph
1988
7 5 p. 439-
1 p.
artikel
                             131 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland