Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             75 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A beginner's guide to auditing unix: Part 2 Nelms, Chris
1993
10 p. 8-12
5 p.
artikel
2 America's electronic godfathers Bequai, August
1996
10 p. 36-39
4 p.
artikel
3 An expert system for financial and accounting information system auditing Akoka, J.
1997
10 p. 8-19
12 p.
artikel
4 A question of copyright Dinsdale, Danelle
1996
10 p. 8-
1 p.
artikel
5 Audit of projects in a structured environment Tolhurst, Alan
1994
10 p. 7-18
12 p.
artikel
6 Back from holiday! 1996
10 p. 46-47
2 p.
artikel
7 B1 and C2 security certification for Informix database 1993
10 p. 18-
1 p.
artikel
8 BSA invites you to get legal via LegalWare 1997
10 p. 6-
1 p.
artikel
9 Chicago nightmare — the shape of things to come? 1994
10 p. 18-
1 p.
artikel
10 Code-breaking program freely available 1993
10 p. 19-
1 p.
artikel
11 Companies could be liable for employee hi-tech harrassment 1996
10 p. 9-
1 p.
artikel
12 Company computer security policy Hinde, S.V.
1992
10 p. 8-12
5 p.
artikel
13 Computer audit — A threshold Lindup, Ken R.
1991
10 p. 17-21
5 p.
artikel
14 Control concepts — Who's buying? McLean, Kevin
1995
10 p. 3-14
12 p.
artikel
15 Covert local area network surveillance McLeod, Ken
1993
10 p. 13-15
3 p.
artikel
16 CSI survey reveals some startling facts about cyberspace 1995
10 p. 18-
1 p.
artikel
17 Data General offloads disaster recovery operation 1993
10 p. 19-
1 p.
artikel
18 Déjà vu — Daiwa Bank loses $1.1 billion due to rogue trader 1995
10 p. 17-
1 p.
artikel
19 Double fine issued by DPR 1996
10 p. 8-
1 p.
artikel
20 DTI code to become British standard 1994
10 p. 18-
1 p.
artikel
21 Editorial 1991
10 p. 1-2
2 p.
artikel
22 Editorial Hinde, Stephen
1994
10 p. 1-4
4 p.
artikel
23 Editorial 1992
10 p. 1-2
2 p.
artikel
24 Editorial 1993
10 p. 1-3
3 p.
artikel
25 Events 1997
10 p. 32-
1 p.
artikel
26 Events 1996
10 p. 48-
1 p.
artikel
27 Events 1991
10 p. 23-24
2 p.
artikel
28 Events 1993
10 p. 20-
1 p.
artikel
29 Events 1992
10 p. 20-
1 p.
artikel
30 Events 1994
10 p. 20-
1 p.
artikel
31 Events 1995
10 p. 20-
1 p.
artikel
32 FAST brings first industry prosecution under new Trademarks Act 1995
10 p. 17-18
2 p.
artikel
33 Fly-by-wire safety critical software meets criticism 1993
10 p. 19-
1 p.
artikel
34 Flying a kite for computer security Hinde, Stephen
1995
10 p. 1-3
3 p.
artikel
35 F-Secure Anti-Virus eases admininstrators job 1997
10 p. 7-
1 p.
artikel
36 Hacker fined for university break-in 1993
10 p. 18-
1 p.
artikel
37 IIA-UK welcomes proposed BS7799 accreditation scheme 1995
10 p. 18-
1 p.
artikel
38 Improving your organization's attitude and commitment to security Dickie, John
1996
10 p. 28-35
8 p.
artikel
39 International aspects of the internet Davis, Dai
1997
10 p. 28-31
4 p.
artikel
40 IT and legal risks management Jessop, Gareth O
1995
10 p. 14-17
4 p.
artikel
41 ITSEC—An ongoing process 1992
10 p. 3-8
6 p.
artikel
42 ITSEC status report International Consultant,
1991
10 p. 15-17
3 p.
artikel
43 Latest version of the barefoot auditor released 1994
10 p. 19-
1 p.
artikel
44 Lockheed Martin & NEC biometrie ID alliance 1997
10 p. 7-
1 p.
artikel
45 Looking over the horizon: Is effectiveness in the 1990s Hutt, Ed
1996
10 p. 10-26
17 p.
artikel
46 Microcomputer based CAAT in the 90s: Part 1 Thiel, Christopher E.
1993
10 p. 3-8
6 p.
artikel
47 Millions feared lost in holiday crash 1993
10 p. 18-
1 p.
artikel
48 Monitoring and review of control systems Hinde, Stephen
1993
10 p. 15-17
3 p.
artikel
49 Neural networks and the auditor Macguire, Tim
1997
10 p. 20-24
5 p.
artikel
50 New method of fighting computer viruses announced 1995
10 p. 19-
1 p.
artikel
51 News 1991
10 p. 21-23
3 p.
artikel
52 News 1992
10 p. 17-19
3 p.
artikel
53 Notebook: Coding simple decision tables in procedural languages Stock, Tony
1994
10 p. 4-7
4 p.
artikel
54 Outsourcing contracts: 41% fail to make transition 1997
10 p. 5-
1 p.
artikel
55 Perceptions and realities: the need for risk management programmes Hinde, Stephen
1997
10 p. 2-4
3 p.
artikel
56 Pirates threaten software industry 1994
10 p. 18-19
2 p.
artikel
57 Proxima secures sign-ons 1997
10 p. 5-
1 p.
artikel
58 Regular cleaning of computers reduces risk of crashes 1995
10 p. 18-19
2 p.
artikel
59 Restating the foundation of information security Parker, Donn B.
1991
10 p. 2-15
14 p.
artikel
60 Scanning tool slashes time wasted on year 2000 work 1997
10 p. 5-
1 p.
artikel
61 SCO warns users of OS security loophole 1993
10 p. 17-18
2 p.
artikel
62 Shrink wrap licences 1996
10 p. 8-
1 p.
artikel
63 Software bug leads to airport mayhem 1995
10 p. 18-
1 p.
artikel
64 Taskforce 2000 urges businesses to recognize Y2K significance 1996
10 p. 9-
1 p.
artikel
65 Theft of data in cyberspace: Management's role Bequai, August
1997
10 p. 25-27
3 p.
artikel
66 The psychology of computer crime — Part 2 Buckner, Kathy
1992
10 p. 12-16
5 p.
artikel
67 Trend towards business-wide disaster recovery plans 1996
10 p. 7-
1 p.
artikel
68 UK banking system hit by software crash 1996
10 p. 7-
1 p.
artikel
69 UK government announces new code of practice for computer security 1993
10 p. 17-
1 p.
artikel
70 UK health service sets up computer and information management advisory group 1993
10 p. 19-
1 p.
artikel
71 Unwary franchisees risk prosecution 1997
10 p. 6-
1 p.
artikel
72 VAT software error leads to £8m windfall 1996
10 p. 7-
1 p.
artikel
73 Who controls your encryption? 1996
10 p. 40-45
6 p.
artikel
74 World saved by a computer virus Hinde, Stephen
1996
10 p. 2-6
5 p.
artikel
75 Y2K time machine? 1996
10 p. 9-
1 p.
artikel
                             75 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland