nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
Highland, EstherH. |
|
1989 |
8 |
5 |
p. 445-455 11 p. |
artikel |
2 |
A path context model for addressing security in potentially non-secure environments
|
Boshoff, W.H. |
|
1989 |
8 |
5 |
p. 417-425 9 p. |
artikel |
3 |
Calendar
|
|
|
1989 |
8 |
5 |
p. 456- 1 p. |
artikel |
4 |
Digital payment systems enabling security and unobservability
|
Bürk, Holger |
|
1989 |
8 |
5 |
p. 399-416 18 p. |
artikel |
5 |
Framework of a methodology for the life cycle of computer security in an organization
|
Badenhorst, K.P. |
|
1989 |
8 |
5 |
p. 433-442 10 p. |
artikel |
6 |
From the editor
|
Highland, Harold Joseph |
|
1989 |
8 |
5 |
p. 366-367 2 p. |
artikel |
7 |
IFIP technical committee 11
|
|
|
1989 |
8 |
5 |
p. 443-444 2 p. |
artikel |
8 |
International board of referees
|
|
|
1989 |
8 |
5 |
p. 397- 1 p. |
artikel |
9 |
It's time to rethink data processing fire protection
|
Menkus, Belden |
|
1989 |
8 |
5 |
p. 389-394 6 p. |
artikel |
10 |
Preventing viruses in computer systems
|
Wiseman, Simon |
|
1989 |
8 |
5 |
p. 427-432 6 p. |
artikel |
11 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1989 |
8 |
5 |
p. 369-380 12 p. |
artikel |
12 |
Twenty-two reasons why MIS subordinates don't measure up to their bosses' expectations
|
Bologna, G.J. |
|
1989 |
8 |
5 |
p. 395-396 2 p. |
artikel |
13 |
Viruses–a management issue
|
DeMaio, Harry B. |
|
1989 |
8 |
5 |
p. 381-388 8 p. |
artikel |