nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1990 |
9 |
1 |
p. 87-96 10 p. |
artikel |
2 |
A key management algorithm for secure communication in open systems interconnection architecture
|
Ramaswamy, Raju |
|
1990 |
9 |
1 |
p. 77-84 8 p. |
artikel |
3 |
A security scheme for resource sharing over a network
|
Burns, John |
|
1990 |
9 |
1 |
p. 67-75 9 p. |
artikel |
4 |
Computer viruses: Can they be prevented?
|
Zajac Jr., Bernard P. |
|
1990 |
9 |
1 |
p. 25-31 7 p. |
artikel |
5 |
Conference report: 2300 brave virus threat to attend national security conference
|
Carrol, John M. |
|
1990 |
9 |
1 |
p. 45-49 5 p. |
artikel |
6 |
Conference report: COMPSEC '89
|
Evans, Paul |
|
1990 |
9 |
1 |
p. 41-44 4 p. |
artikel |
7 |
Editorial Board
|
|
|
1990 |
9 |
1 |
p. 2- 1 p. |
artikel |
8 |
From the editor
|
|
|
1990 |
9 |
1 |
p. 2-3 2 p. |
artikel |
9 |
IFIP technical committee 11
|
|
|
1990 |
9 |
1 |
p. 85-86 2 p. |
artikel |
10 |
International board of referees
|
|
|
1990 |
9 |
1 |
p. 51- 1 p. |
artikel |
11 |
Panel discussion—into the 1990s
|
|
|
1990 |
9 |
1 |
p. 37-40 4 p. |
artikel |
12 |
Principles of secure information systems design
|
Wood, Charles Cresson |
|
1990 |
9 |
1 |
p. 13-24 12 p. |
artikel |
13 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1990 |
9 |
1 |
p. 4-11 8 p. |
artikel |
14 |
Software vendors capitalize on security needs
|
Klopp, Charlotte |
|
1990 |
9 |
1 |
p. 33-35 3 p. |
artikel |
15 |
Tailor-made auditing of information systems for the detection of fraud
|
Mercer, Lindsay C.J. |
|
1990 |
9 |
1 |
p. 59-66 8 p. |
artikel |
16 |
The threat of information theft by reception of electromagnetic radiation from RS-232 cables
|
Smulders, Peter |
|
1990 |
9 |
1 |
p. 53-58 6 p. |
artikel |