nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1989 |
8 |
7 |
p. 633-640 8 p. |
artikel |
2 |
A methodology for penetration testing
|
Pfleeger, Charles P. |
|
1989 |
8 |
7 |
p. 613-620 8 p. |
artikel |
3 |
A simple way of improving the login security
|
Dehnad, Khosrow |
|
1989 |
8 |
7 |
p. 607-611 5 p. |
artikel |
4 |
A survey of password mechanisms: Weaknesses and potential improvements. Part 1
|
Jobusch, David L. |
|
1989 |
8 |
7 |
p. 587-604 18 p. |
artikel |
5 |
Calendar
|
|
|
1989 |
8 |
7 |
p. 641-642 2 p. |
artikel |
6 |
Computer-related fire problems revisited
|
Menkus, Belden |
|
1989 |
8 |
7 |
p. 581-586 6 p. |
artikel |
7 |
From the editor
|
|
|
1989 |
8 |
7 |
p. 550-552 3 p. |
artikel |
8 |
IFIP technical committee 11
|
|
|
1989 |
8 |
7 |
p. 631-632 2 p. |
artikel |
9 |
International board of referees
|
|
|
1989 |
8 |
7 |
p. 605- 1 p. |
artikel |
10 |
Optimized software implementations of the modular exponentiation on general purpose microprocessors
|
Bong, Dieter |
|
1989 |
8 |
7 |
p. 621-630 10 p. |
artikel |
11 |
Passwords in use in a university timesharing environment
|
Riddle, Bruce L. |
|
1989 |
8 |
7 |
p. 569-579 11 p. |
artikel |
12 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1989 |
8 |
7 |
p. 553-561 9 p. |
artikel |
13 |
Secret disk II— administrator
|
Highland, Harold Joseph |
|
1989 |
8 |
7 |
p. 563-568 6 p. |
artikel |