nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1990 |
9 |
2 |
p. 177-187 11 p. |
artikel |
2 |
Auditing the change management process
|
Paans, R. |
|
1990 |
9 |
2 |
p. 161-174 14 p. |
artikel |
3 |
Calendar
|
|
|
1990 |
9 |
2 |
p. 189-191 3 p. |
artikel |
4 |
Computer crime: “Preparing the computer specific search warrant”
|
Tabbey, Kirk W. |
|
1990 |
9 |
2 |
p. 117-123 7 p. |
artikel |
5 |
Computer virus prevention and containment on mainframes
|
Al-Dossary, Ghannam M. |
|
1990 |
9 |
2 |
p. 131-137 7 p. |
artikel |
6 |
Friday the 13th, facts and fancies
|
Herschberg, I.S. |
|
1990 |
9 |
2 |
p. 125-130 6 p. |
artikel |
7 |
From the editor
|
|
|
1990 |
9 |
2 |
p. 100-101 2 p. |
artikel |
8 |
How an “audit trail” aids in maintaining information integrity…as illustrated in retailing
|
Menkus, Belden |
|
1990 |
9 |
2 |
p. 111-116 6 p. |
artikel |
9 |
IFIP technical committee 11
|
|
|
1990 |
9 |
2 |
p. 175-176 2 p. |
artikel |
10 |
International board of referees
|
|
|
1990 |
9 |
2 |
p. 143- 1 p. |
artikel |
11 |
Microcomputer security systems attempt to lock up desktops
|
Klopp, Charlotte |
|
1990 |
9 |
2 |
p. 139-141 3 p. |
artikel |
12 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1990 |
9 |
2 |
p. 102-109 8 p. |
artikel |
13 |
Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures
|
Domingo-Ferrer, Josep |
|
1990 |
9 |
2 |
p. 145-152 8 p. |
artikel |
14 |
SPAN—a DSS for security plan analysis
|
Zviran, Moshe |
|
1990 |
9 |
2 |
p. 153-160 8 p. |
artikel |