nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A beginner's guide to auditing unix: Part 2
|
Nelms, Chris |
|
1993 |
|
10 |
p. 8-12 5 p. |
artikel |
2 |
America's electronic godfathers
|
Bequai, August |
|
1996 |
|
10 |
p. 36-39 4 p. |
artikel |
3 |
An expert system for financial and accounting information system auditing
|
Akoka, J. |
|
1997 |
|
10 |
p. 8-19 12 p. |
artikel |
4 |
A question of copyright
|
Dinsdale, Danelle |
|
1996 |
|
10 |
p. 8- 1 p. |
artikel |
5 |
Audit of projects in a structured environment
|
Tolhurst, Alan |
|
1994 |
|
10 |
p. 7-18 12 p. |
artikel |
6 |
Back from holiday!
|
|
|
1996 |
|
10 |
p. 46-47 2 p. |
artikel |
7 |
B1 and C2 security certification for Informix database
|
|
|
1993 |
|
10 |
p. 18- 1 p. |
artikel |
8 |
BSA invites you to get legal via LegalWare
|
|
|
1997 |
|
10 |
p. 6- 1 p. |
artikel |
9 |
Chicago nightmare — the shape of things to come?
|
|
|
1994 |
|
10 |
p. 18- 1 p. |
artikel |
10 |
Code-breaking program freely available
|
|
|
1993 |
|
10 |
p. 19- 1 p. |
artikel |
11 |
Companies could be liable for employee hi-tech harrassment
|
|
|
1996 |
|
10 |
p. 9- 1 p. |
artikel |
12 |
Company computer security policy
|
Hinde, S.V. |
|
1992 |
|
10 |
p. 8-12 5 p. |
artikel |
13 |
Computer audit — A threshold
|
Lindup, Ken R. |
|
1991 |
|
10 |
p. 17-21 5 p. |
artikel |
14 |
Control concepts — Who's buying?
|
McLean, Kevin |
|
1995 |
|
10 |
p. 3-14 12 p. |
artikel |
15 |
Covert local area network surveillance
|
McLeod, Ken |
|
1993 |
|
10 |
p. 13-15 3 p. |
artikel |
16 |
CSI survey reveals some startling facts about cyberspace
|
|
|
1995 |
|
10 |
p. 18- 1 p. |
artikel |
17 |
Data General offloads disaster recovery operation
|
|
|
1993 |
|
10 |
p. 19- 1 p. |
artikel |
18 |
Déjà vu — Daiwa Bank loses $1.1 billion due to rogue trader
|
|
|
1995 |
|
10 |
p. 17- 1 p. |
artikel |
19 |
Double fine issued by DPR
|
|
|
1996 |
|
10 |
p. 8- 1 p. |
artikel |
20 |
DTI code to become British standard
|
|
|
1994 |
|
10 |
p. 18- 1 p. |
artikel |
21 |
Editorial
|
|
|
1991 |
|
10 |
p. 1-2 2 p. |
artikel |
22 |
Editorial
|
Hinde, Stephen |
|
1994 |
|
10 |
p. 1-4 4 p. |
artikel |
23 |
Editorial
|
|
|
1992 |
|
10 |
p. 1-2 2 p. |
artikel |
24 |
Editorial
|
|
|
1993 |
|
10 |
p. 1-3 3 p. |
artikel |
25 |
Events
|
|
|
1997 |
|
10 |
p. 32- 1 p. |
artikel |
26 |
Events
|
|
|
1996 |
|
10 |
p. 48- 1 p. |
artikel |
27 |
Events
|
|
|
1991 |
|
10 |
p. 23-24 2 p. |
artikel |
28 |
Events
|
|
|
1993 |
|
10 |
p. 20- 1 p. |
artikel |
29 |
Events
|
|
|
1992 |
|
10 |
p. 20- 1 p. |
artikel |
30 |
Events
|
|
|
1994 |
|
10 |
p. 20- 1 p. |
artikel |
31 |
Events
|
|
|
1995 |
|
10 |
p. 20- 1 p. |
artikel |
32 |
FAST brings first industry prosecution under new Trademarks Act
|
|
|
1995 |
|
10 |
p. 17-18 2 p. |
artikel |
33 |
Fly-by-wire safety critical software meets criticism
|
|
|
1993 |
|
10 |
p. 19- 1 p. |
artikel |
34 |
Flying a kite for computer security
|
Hinde, Stephen |
|
1995 |
|
10 |
p. 1-3 3 p. |
artikel |
35 |
F-Secure Anti-Virus eases admininstrators job
|
|
|
1997 |
|
10 |
p. 7- 1 p. |
artikel |
36 |
Hacker fined for university break-in
|
|
|
1993 |
|
10 |
p. 18- 1 p. |
artikel |
37 |
IIA-UK welcomes proposed BS7799 accreditation scheme
|
|
|
1995 |
|
10 |
p. 18- 1 p. |
artikel |
38 |
Improving your organization's attitude and commitment to security
|
Dickie, John |
|
1996 |
|
10 |
p. 28-35 8 p. |
artikel |
39 |
International aspects of the internet
|
Davis, Dai |
|
1997 |
|
10 |
p. 28-31 4 p. |
artikel |
40 |
IT and legal risks management
|
Jessop, Gareth O |
|
1995 |
|
10 |
p. 14-17 4 p. |
artikel |
41 |
ITSEC—An ongoing process
|
|
|
1992 |
|
10 |
p. 3-8 6 p. |
artikel |
42 |
ITSEC status report
|
International Consultant, |
|
1991 |
|
10 |
p. 15-17 3 p. |
artikel |
43 |
Latest version of the barefoot auditor released
|
|
|
1994 |
|
10 |
p. 19- 1 p. |
artikel |
44 |
Lockheed Martin & NEC biometrie ID alliance
|
|
|
1997 |
|
10 |
p. 7- 1 p. |
artikel |
45 |
Looking over the horizon: Is effectiveness in the 1990s
|
Hutt, Ed |
|
1996 |
|
10 |
p. 10-26 17 p. |
artikel |
46 |
Microcomputer based CAAT in the 90s: Part 1
|
Thiel, Christopher E. |
|
1993 |
|
10 |
p. 3-8 6 p. |
artikel |
47 |
Millions feared lost in holiday crash
|
|
|
1993 |
|
10 |
p. 18- 1 p. |
artikel |
48 |
Monitoring and review of control systems
|
Hinde, Stephen |
|
1993 |
|
10 |
p. 15-17 3 p. |
artikel |
49 |
Neural networks and the auditor
|
Macguire, Tim |
|
1997 |
|
10 |
p. 20-24 5 p. |
artikel |
50 |
New method of fighting computer viruses announced
|
|
|
1995 |
|
10 |
p. 19- 1 p. |
artikel |
51 |
News
|
|
|
1991 |
|
10 |
p. 21-23 3 p. |
artikel |
52 |
News
|
|
|
1992 |
|
10 |
p. 17-19 3 p. |
artikel |
53 |
Notebook: Coding simple decision tables in procedural languages
|
Stock, Tony |
|
1994 |
|
10 |
p. 4-7 4 p. |
artikel |
54 |
Outsourcing contracts: 41% fail to make transition
|
|
|
1997 |
|
10 |
p. 5- 1 p. |
artikel |
55 |
Perceptions and realities: the need for risk management programmes
|
Hinde, Stephen |
|
1997 |
|
10 |
p. 2-4 3 p. |
artikel |
56 |
Pirates threaten software industry
|
|
|
1994 |
|
10 |
p. 18-19 2 p. |
artikel |
57 |
Proxima secures sign-ons
|
|
|
1997 |
|
10 |
p. 5- 1 p. |
artikel |
58 |
Regular cleaning of computers reduces risk of crashes
|
|
|
1995 |
|
10 |
p. 18-19 2 p. |
artikel |
59 |
Restating the foundation of information security
|
Parker, Donn B. |
|
1991 |
|
10 |
p. 2-15 14 p. |
artikel |
60 |
Scanning tool slashes time wasted on year 2000 work
|
|
|
1997 |
|
10 |
p. 5- 1 p. |
artikel |
61 |
SCO warns users of OS security loophole
|
|
|
1993 |
|
10 |
p. 17-18 2 p. |
artikel |
62 |
Shrink wrap licences
|
|
|
1996 |
|
10 |
p. 8- 1 p. |
artikel |
63 |
Software bug leads to airport mayhem
|
|
|
1995 |
|
10 |
p. 18- 1 p. |
artikel |
64 |
Taskforce 2000 urges businesses to recognize Y2K significance
|
|
|
1996 |
|
10 |
p. 9- 1 p. |
artikel |
65 |
Theft of data in cyberspace: Management's role
|
Bequai, August |
|
1997 |
|
10 |
p. 25-27 3 p. |
artikel |
66 |
The psychology of computer crime — Part 2
|
Buckner, Kathy |
|
1992 |
|
10 |
p. 12-16 5 p. |
artikel |
67 |
Trend towards business-wide disaster recovery plans
|
|
|
1996 |
|
10 |
p. 7- 1 p. |
artikel |
68 |
UK banking system hit by software crash
|
|
|
1996 |
|
10 |
p. 7- 1 p. |
artikel |
69 |
UK government announces new code of practice for computer security
|
|
|
1993 |
|
10 |
p. 17- 1 p. |
artikel |
70 |
UK health service sets up computer and information management advisory group
|
|
|
1993 |
|
10 |
p. 19- 1 p. |
artikel |
71 |
Unwary franchisees risk prosecution
|
|
|
1997 |
|
10 |
p. 6- 1 p. |
artikel |
72 |
VAT software error leads to £8m windfall
|
|
|
1996 |
|
10 |
p. 7- 1 p. |
artikel |
73 |
Who controls your encryption?
|
|
|
1996 |
|
10 |
p. 40-45 6 p. |
artikel |
74 |
World saved by a computer virus
|
Hinde, Stephen |
|
1996 |
|
10 |
p. 2-6 5 p. |
artikel |
75 |
Y2K time machine?
|
|
|
1996 |
|
10 |
p. 9- 1 p. |
artikel |