nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
Highland, EstherH. |
|
1988 |
7 |
6 |
p. 609-615 7 p. |
artikel |
2 |
Author index to volume 7
|
|
|
1988 |
7 |
6 |
p. 617-618 2 p. |
artikel |
3 |
Calendar
|
|
|
1988 |
7 |
6 |
p. 616- 1 p. |
artikel |
4 |
Computer security policy: Important issues
|
Eloff, Jan H.P. |
|
1988 |
7 |
6 |
p. 559-562 4 p. |
artikel |
5 |
From the editor
|
Highland, Harold Joseph |
|
1988 |
7 |
6 |
p. 532- 1 p. |
artikel |
6 |
How secure are computers in the U.S.A.?
|
Stoll, Cliff |
|
1988 |
7 |
6 |
p. 543-547 5 p. |
artikel |
7 |
IFIP technical committee 11
|
|
|
1988 |
7 |
6 |
p. 607-608 2 p. |
artikel |
8 |
Implementing multilevel security by violation privilege
|
Carroll, John M. |
|
1988 |
7 |
6 |
p. 563-573 11 p. |
artikel |
9 |
International board of referees
|
|
|
1988 |
7 |
6 |
p. 557-558 2 p. |
artikel |
10 |
Nested categories for access control
|
Sandhu, Ravinderpal Singh |
|
1988 |
7 |
6 |
p. 599-605 7 p. |
artikel |
11 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1988 |
7 |
6 |
p. 533-541 9 p. |
artikel |
12 |
Soviet white-collar crime and criminal justice
|
Bologna, Jack |
|
1988 |
7 |
6 |
p. 553-556 4 p. |
artikel |
13 |
Subject index to volume 7
|
|
|
1988 |
7 |
6 |
p. 619- 1 p. |
artikel |
14 |
The personal model of data:
|
Biskup, Joachim |
|
1988 |
7 |
6 |
p. 575-597 23 p. |
artikel |
15 |
Understanding password compromise
|
Menkus, Belden |
|
1988 |
7 |
6 |
p. 549-552 4 p. |
artikel |