nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
Highland, EstherH. |
|
1989 |
8 |
3 |
p. 259-269 11 p. |
artikel |
2 |
Calendar
|
|
|
1989 |
8 |
3 |
p. 270- 1 p. |
artikel |
3 |
Emerging vulnerabilities in office automation security
|
Keenan, Thomas P. |
|
1989 |
8 |
3 |
p. 223-227 5 p. |
artikel |
4 |
From the editor
|
Highland, Harold Joseph |
|
1989 |
8 |
3 |
p. 176-177 2 p. |
artikel |
5 |
IFIP technical committee 11
|
|
|
1989 |
8 |
3 |
p. 257-258 2 p. |
artikel |
6 |
International board of referees
|
|
|
1989 |
8 |
3 |
p. 207- 1 p. |
artikel |
7 |
Physical security: Selecting an access control system
|
Menkus, Belden |
|
1989 |
8 |
3 |
p. 201-205 5 p. |
artikel |
8 |
Planning: A means to achieve data communications security
|
Wood, Charles Cresson |
|
1989 |
8 |
3 |
p. 189-199 11 p. |
artikel |
9 |
Prototyping to explore MLS/DBMS design
|
Thomsen, D.J. |
|
1989 |
8 |
3 |
p. 229-245 17 p. |
artikel |
10 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1989 |
8 |
3 |
p. 178-188 11 p. |
artikel |
11 |
Security in electronic funds transfer: Message integrity in money transfer and bond settlements through GE information services' global network
|
Shain, M. |
|
1989 |
8 |
3 |
p. 209-221 13 p. |
artikel |
12 |
Smartcards outsmart computer crime
|
Fifield, Ken J. |
|
1989 |
8 |
3 |
p. 247-255 9 p. |
artikel |