nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1990 |
9 |
5 |
p. 449-458 10 p. |
artikel |
2 |
A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems
|
McKosky, Robert A. |
|
1990 |
9 |
5 |
p. 431-446 16 p. |
artikel |
3 |
Calendar
|
|
|
1990 |
9 |
5 |
p. 461-463 3 p. |
artikel |
4 |
Conference announcement
|
|
|
1990 |
9 |
5 |
p. 464- 1 p. |
artikel |
5 |
East Germany— haven for software piracy
|
Gliss, Hans |
|
1990 |
9 |
5 |
p. 391-393 3 p. |
artikel |
6 |
From the editor
|
|
|
1990 |
9 |
5 |
p. 364-365 2 p. |
artikel |
7 |
How many information security staff people should you have?
|
Wood, Charles Cresson |
|
1990 |
9 |
5 |
p. 395-402 8 p. |
artikel |
8 |
IFIP technical committee 11
|
|
|
1990 |
9 |
5 |
p. 447-448 2 p. |
artikel |
9 |
International board of referres
|
|
|
1990 |
9 |
5 |
p. 409- 1 p. |
artikel |
10 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1990 |
9 |
5 |
p. 366-378 13 p. |
artikel |
11 |
Secure systems design—an evolving national strategy
|
Winters, Peter |
|
1990 |
9 |
5 |
p. 379-389 11 p. |
artikel |
12 |
Software evaluation in high integrity systems
|
Lloyd, Ivor |
|
1990 |
9 |
5 |
p. 419-429 11 p. |
artikel |
13 |
Taschenlexicon sicherheit der informationstechnik
|
Schell, Roger R. |
|
1990 |
9 |
5 |
p. 459-460 2 p. |
artikel |
14 |
The IPM model of computer virus management
|
Jones, Scott K. |
|
1990 |
9 |
5 |
p. 411-417 7 p. |
artikel |
15 |
The numbers game
|
David, Jon |
|
1990 |
9 |
5 |
p. 403-407 5 p. |
artikel |