nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
Highland, EstherH. |
|
1989 |
8 |
1 |
p. 74-82 9 p. |
artikel |
2 |
Access control policies: Some unanswered questions
|
Lunt, Teresa F. |
|
1989 |
8 |
1 |
p. 43-54 12 p. |
artikel |
3 |
A mathematical theory for the spread of computer viruses
|
Gleissner, Winfried |
|
1989 |
8 |
1 |
p. 35-41 7 p. |
artikel |
4 |
A remark on hash functions for message authentication
|
Mitchell, Chris |
|
1989 |
8 |
1 |
p. 55-58 4 p. |
artikel |
5 |
Calendar
|
|
|
1989 |
8 |
1 |
p. 83- 1 p. |
artikel |
6 |
Editorial Board
|
|
|
1989 |
8 |
1 |
p. 2- 1 p. |
artikel |
7 |
From the editor
|
Highland, Harold Joseph |
|
1989 |
8 |
1 |
p. 2- 1 p. |
artikel |
8 |
IFIP Technical Committee 11
|
|
|
1989 |
8 |
1 |
p. 67-68 2 p. |
artikel |
9 |
International board of referees
|
|
|
1989 |
8 |
1 |
p. 33-34 2 p. |
artikel |
10 |
Legal options to computer viruses
|
Zajac Jr., Bernard P. |
|
1989 |
8 |
1 |
p. 25-27 3 p. |
artikel |
11 |
Protecting ownership of proprietary information
|
Moulton, Rolf |
|
1989 |
8 |
1 |
p. 15-21 7 p. |
artikel |
12 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1989 |
8 |
1 |
p. 3-13 11 p. |
artikel |
13 |
Risk analysis and computer security: Towards a theory at last
|
Hoffman, Lance J. |
|
1989 |
8 |
1 |
p. 23-24 2 p. |
artikel |
14 |
Special abstract: Study of computer “viruses” and their potential for infecting Commonwealth computer systems
|
|
|
1989 |
8 |
1 |
p. 69-71 3 p. |
artikel |
15 |
The one minute fraud auditor
|
Bologna, Jack |
|
1989 |
8 |
1 |
p. 29-31 3 p. |
artikel |
16 |
The role of classification of information in controlling data proliferation in end-user personal computer environment
|
Feuerlicht, J. |
|
1989 |
8 |
1 |
p. 59-66 8 p. |
artikel |
17 |
What others are saying
|
|
|
1989 |
8 |
1 |
p. 72-73 2 p. |
artikel |