nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
Highland, EstherH. |
|
1989 |
8 |
6 |
p. 537-546 10 p. |
artikel |
2 |
An introduction to the SMITE approach to secure computing
|
Harrold, C.L. |
|
1989 |
8 |
6 |
p. 495-505 11 p. |
artikel |
3 |
Calendar
|
|
|
1989 |
8 |
6 |
p. 547-548 2 p. |
artikel |
4 |
Evaluation of five risk assessment programs
|
Gardner, Phillip E. |
|
1989 |
8 |
6 |
p. 479-485 7 p. |
artikel |
5 |
From the editor
|
Highlands, Harold Joseph |
|
1989 |
8 |
6 |
p. 458-459 2 p. |
artikel |
6 |
IFIP technical committee 11
|
|
|
1989 |
8 |
6 |
p. 535-536 2 p. |
artikel |
7 |
International board of referees
|
|
|
1989 |
8 |
6 |
p. 493- 1 p. |
artikel |
8 |
Placement of data integrity security services in open systems interconnection architecture
|
Ramaswamy, Raju |
|
1989 |
8 |
6 |
p. 507-516 10 p. |
artikel |
9 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1989 |
8 |
6 |
p. 460-478 19 p. |
artikel |
10 |
SODA: A secure object-oriented database system
|
Keefe, T.F. |
|
1989 |
8 |
6 |
p. 517-533 17 p. |
artikel |
11 |
The employee's role in protecting information assets
|
Menkus, Belden |
|
1989 |
8 |
6 |
p. 487-492 6 p. |
artikel |