nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Air Traffic software delays
|
|
|
1997 |
|
5 |
p. 9- 1 p. |
artikel |
2 |
Alberta Stock Exchange hit again by IT outage
|
|
|
1997 |
|
5 |
p. 6- 1 p. |
artikel |
3 |
Auditing and security
|
Blatchford, Clive |
|
1989 |
|
5 |
p. 2-7 6 p. |
artikel |
4 |
Auditing mainframe-based end-user systems
|
Le Grand, Charles H. |
|
1992 |
|
5 |
p. 7-14 8 p. |
artikel |
5 |
Bankers propose new Code of Practice
|
|
|
1997 |
|
5 |
p. 10- 1 p. |
artikel |
6 |
Bank gives porn pushers stiff penalties
|
|
|
1997 |
|
5 |
p. 6- 1 p. |
artikel |
7 |
Be prepared
|
Pounder, Chris |
|
1996 |
|
5 |
p. 29-30 2 p. |
artikel |
8 |
Beyond the rainbow books
|
Blatchford, Clive |
|
1991 |
|
5 |
p. 3-11 9 p. |
artikel |
9 |
Boy gets unsolicited porn by E-mail
|
|
|
1997 |
|
5 |
p. 7- 1 p. |
artikel |
10 |
Business and auditing impact of new technologies: Part 2
|
Le Grand, Charles |
|
1997 |
|
5 |
p. 20-24 5 p. |
artikel |
11 |
Business continuity planning: Part 1
|
Hearnden, Keith |
|
1995 |
|
5 |
p. 3-10 8 p. |
artikel |
12 |
Business networking and the Internet
|
Blatchford, Clive |
|
1997 |
|
5 |
p. 11-19 9 p. |
artikel |
13 |
Business on the Internet: UK perspectives
|
Parry, Rex |
|
1996 |
|
5 |
p. 27-28 2 p. |
artikel |
14 |
Can an employer monitor its employees' E-mail?
|
Miller, Nigel |
|
1997 |
|
5 |
p. 30-31 2 p. |
artikel |
15 |
Caustic fluid dissolves computer
|
|
|
1994 |
|
5 |
p. 23- 1 p. |
artikel |
16 |
Chase Manhattan keystroke error affects thousands
|
|
|
1996 |
|
5 |
p. 7- 1 p. |
artikel |
17 |
China executes hacker
|
|
|
1993 |
|
5 |
p. 18- 1 p. |
artikel |
18 |
COMPACS '92
|
Bentley, David |
|
1992 |
|
5 |
p. 14-18 5 p. |
artikel |
19 |
Conference report — CACS '93
|
Croxford, Ivan |
|
1993 |
|
5 |
p. 13-15 3 p. |
artikel |
20 |
Conference report —CCOMPACS '93
|
Bentley, D.F. |
|
1993 |
|
5 |
p. 10-13 4 p. |
artikel |
21 |
Corporate web site from CIMA
|
|
|
1996 |
|
5 |
p. 9- 1 p. |
artikel |
22 |
Could you cope without computers?
|
Sadiwnyk, Mike |
|
1995 |
|
5 |
p. 13-16 4 p. |
artikel |
23 |
Data matching bill rushes into law
|
|
|
1997 |
|
5 |
p. 9- 1 p. |
artikel |
24 |
Data Protection Act ruling spotlights accountants
|
|
|
1993 |
|
5 |
p. 17- 1 p. |
artikel |
25 |
DOS virus scan disappointing
|
|
|
1993 |
|
5 |
p. 17- 1 p. |
artikel |
26 |
DTI issue consultative document on security evaluation
|
|
|
1989 |
|
5 |
p. 17-20 4 p. |
artikel |
27 |
Earthquake-hit company downsizes computer system
|
|
|
1995 |
|
5 |
p. 16- 1 p. |
artikel |
28 |
EDI and accounting
|
Vahtera, Pauli |
|
1996 |
|
5 |
p. 10-18 9 p. |
artikel |
29 |
Editorial
|
|
|
1991 |
|
5 |
p. 1-3 3 p. |
artikel |
30 |
Editorial
|
Hinde, S.V. |
|
1992 |
|
5 |
p. 1-2 2 p. |
artikel |
31 |
Editorial
|
Hinde, Steven |
|
1994 |
|
5 |
p. 1-3 3 p. |
artikel |
32 |
Editorial
|
Hinde, Stephen |
|
1993 |
|
5 |
p. 1-3 3 p. |
artikel |
33 |
Editorial
|
|
|
1989 |
|
5 |
p. 1- 1 p. |
artikel |
34 |
Editorial
|
|
|
1990 |
|
5 |
p. 1-2 2 p. |
artikel |
35 |
EU immigration monitoring system crashes
|
|
|
1995 |
|
5 |
p. 16-17 2 p. |
artikel |
36 |
Events
|
|
|
1997 |
|
5 |
p. 32- 1 p. |
artikel |
37 |
Events
|
|
|
1995 |
|
5 |
p. 20- 1 p. |
artikel |
38 |
Events
|
|
|
1991 |
|
5 |
p. 23-24 2 p. |
artikel |
39 |
Events
|
|
|
1993 |
|
5 |
p. 20- 1 p. |
artikel |
40 |
Events
|
|
|
1994 |
|
5 |
p. 24- 1 p. |
artikel |
41 |
Events
|
|
|
1992 |
|
5 |
p. 20- 1 p. |
artikel |
42 |
Events
|
|
|
1989 |
|
5 |
p. 23- 1 p. |
artikel |
43 |
Events
|
|
|
1990 |
|
5 |
p. 23-24 2 p. |
artikel |
44 |
Firm tests out its disaster recovery plan
|
|
|
1996 |
|
5 |
p. 6- 1 p. |
artikel |
45 |
Forthcoming events relevant to computer audit, security and controlelevant to computer audit,
|
|
|
1996 |
|
5 |
p. 36- 1 p. |
artikel |
46 |
From corner teashop to Internet cafe
|
Hinde, Stephen |
|
1997 |
|
5 |
p. 2-5 4 p. |
artikel |
47 |
Further business continuity development needed in many businesses
|
|
|
1996 |
|
5 |
p. 7- 1 p. |
artikel |
48 |
Glitch elevates misdemeanours
|
|
|
1997 |
|
5 |
p. 6- 1 p. |
artikel |
49 |
Hackers and phone phreaks: Preventing telecom frauds
|
Bequai, August |
|
1997 |
|
5 |
p. 25-29 5 p. |
artikel |
50 |
Hackers break into Quebec premier's office
|
|
|
1993 |
|
5 |
p. 19- 1 p. |
artikel |
51 |
Hackers imprisoned under Computer Misuse Act
|
|
|
1993 |
|
5 |
p. 16- 1 p. |
artikel |
52 |
Hands-on experience in dealing with a virus attack
|
|
|
1996 |
|
5 |
p. 6- 1 p. |
artikel |
53 |
IBM launch PC LAN recovery service
|
|
|
1993 |
|
5 |
p. 19- 1 p. |
artikel |
54 |
Industry grumbles Clipper Chips
|
|
|
1993 |
|
5 |
p. 16-17 2 p. |
artikel |
55 |
Information systems security — the last five years
|
|
|
1994 |
|
5 |
p. 18-22 5 p. |
artikel |
56 |
Internet naming plan signed
|
|
|
1997 |
|
5 |
p. 7- 1 p. |
artikel |
57 |
Internet shows its mettle in face of disaster
|
|
|
1995 |
|
5 |
p. 17-18 2 p. |
artikel |
58 |
IRS comes under scrutiny
|
|
|
1997 |
|
5 |
p. 7- 1 p. |
artikel |
59 |
IT causes stress, and offers a solution?
|
|
|
1993 |
|
5 |
p. 19- 1 p. |
artikel |
60 |
IT security evaluation manual — The current status
|
|
|
1992 |
|
5 |
p. 3-7 5 p. |
artikel |
61 |
It security testing, a practical guide— part 7
|
Robertson, Bernard |
|
1993 |
|
5 |
p. 6-10 5 p. |
artikel |
62 |
London Fire Brigade gets its fingers burnt
|
|
|
1993 |
|
5 |
p. 18- 1 p. |
artikel |
63 |
Methodology for conducting a security review
|
Fitzgerald, Jerry |
|
1989 |
|
5 |
p. 8-11 4 p. |
artikel |
64 |
Millennium bomb continues to trouble UK
|
Szweda, Roy |
|
1997 |
|
5 |
p. 8- 1 p. |
artikel |
65 |
More illegal software users caught
|
|
|
1997 |
|
5 |
p. 10- 1 p. |
artikel |
66 |
MORI survey shows switch to outsourcing
|
|
|
1993 |
|
5 |
p. 19- 1 p. |
artikel |
67 |
Most organizations yet to define a Year 2000 strategy
|
|
|
1996 |
|
5 |
p. 6- 1 p. |
artikel |
68 |
MPs criticise security of UK lottery
|
|
|
1997 |
|
5 |
p. 9- 1 p. |
artikel |
69 |
NAO report exposes inadequate MOD system
|
|
|
1993 |
|
5 |
p. 17- 1 p. |
artikel |
70 |
Net pottering: Internet security
|
|
|
1996 |
|
5 |
p. 31-32 2 p. |
artikel |
71 |
Network failures prevented
|
|
|
1994 |
|
5 |
p. 23- 1 p. |
artikel |
72 |
New computer system causes chaos in Germany
|
Gliss, Hans |
|
1995 |
|
5 |
p. 17- 1 p. |
artikel |
73 |
New guidance notes from data protection registrar
|
Bentley, David |
|
1996 |
|
5 |
p. 8-9 2 p. |
artikel |
74 |
News
|
|
|
1991 |
|
5 |
p. 19-23 5 p. |
artikel |
75 |
News
|
|
|
1992 |
|
5 |
p. 18-19 2 p. |
artikel |
76 |
News
|
|
|
1989 |
|
5 |
p. 17-20 4 p. |
artikel |
77 |
News
|
|
|
1990 |
|
5 |
p. 17-22 6 p. |
artikel |
78 |
News
|
|
|
1989 |
|
5 |
p. 16- 1 p. |
artikel |
79 |
News
|
|
|
1989 |
|
5 |
p. 7- 1 p. |
artikel |
80 |
New version of recovery management tool for DB2 announced
|
|
|
1995 |
|
5 |
p. 19- 1 p. |
artikel |
81 |
OECD crypto guidelines
|
|
|
1997 |
|
5 |
p. 9- 1 p. |
artikel |
82 |
Opposition party claim report exposes UK government IT security shambles
|
|
|
1995 |
|
5 |
p. 16- 1 p. |
artikel |
83 |
Organization B disaster recovery plan: Part 2
|
|
|
1994 |
|
5 |
p. 7-17 11 p. |
artikel |
84 |
Paul Bedworth: The barrister's tale
|
Kelman, Alistair |
|
1993 |
|
5 |
p. 3-6 4 p. |
artikel |
85 |
Product review
|
Oliphant, Alan |
|
1989 |
|
5 |
p. 12-16 5 p. |
artikel |
86 |
Product reviews
|
|
|
1991 |
|
5 |
p. 15-18 4 p. |
artikel |
87 |
Publications
|
|
|
1990 |
|
5 |
p. 22-23 2 p. |
artikel |
88 |
RACF 1.9 enhancements
|
Oliphant, Alan S. |
|
1991 |
|
5 |
p. 11-15 5 p. |
artikel |
89 |
Regina-v-Brown: A Snooper's charter?
|
Rebeiro, Michael |
|
1996 |
|
5 |
p. 33-35 3 p. |
artikel |
90 |
Safety critical software that was not that safe
|
Hinde, Stephen |
|
1995 |
|
5 |
p. 1-3 3 p. |
artikel |
91 |
SAP: Changing risks, internal controls and fraud prevention
|
Iyer, Nigel |
|
1996 |
|
5 |
p. 19-22 4 p. |
artikel |
92 |
Secure UNIX—improved administrative control
|
|
|
1990 |
|
5 |
p. 2-6 5 p. |
artikel |
93 |
Security in computing
|
|
|
1991 |
|
5 |
p. 18- 1 p. |
artikel |
94 |
Security package keeps unauthorized users off the Net
|
|
|
1996 |
|
5 |
p. 9- 1 p. |
artikel |
95 |
Security specialist launches new IT risk analysis service
|
|
|
1995 |
|
5 |
p. 19- 1 p. |
artikel |
96 |
Summer school on IT audit, control and security
|
|
|
1995 |
|
5 |
p. 18-19 2 p. |
artikel |
97 |
Syntegra provide disaster recovery service
|
|
|
1994 |
|
5 |
p. 23- 1 p. |
artikel |
98 |
Taiwan seeks to introduce intellectual property guidelines
|
|
|
1993 |
|
5 |
p. 18- 1 p. |
artikel |
99 |
The auditor's fight against fraud
|
Pounder, Chris |
|
1996 |
|
5 |
p. 5- 1 p. |
artikel |
100 |
The embattled Internet
|
Bequai, August |
|
1996 |
|
5 |
p. 23-26 4 p. |
artikel |
101 |
The management and control of system security
|
Halliden, Paul |
|
1990 |
|
5 |
p. 7-17 11 p. |
artikel |
102 |
The safety of Sizewell
|
|
|
1994 |
|
5 |
p. 23- 1 p. |
artikel |
103 |
TUPE no protection in FM deals
|
|
|
1993 |
|
5 |
p. 18- 1 p. |
artikel |
104 |
Unfair contracts: New European directive to deliver more power to the consumer's elbow?
|
Davis, Dai |
|
1995 |
|
5 |
p. 10-13 4 p. |
artikel |
105 |
Unix — checking for exposures
|
|
|
1994 |
|
5 |
p. 3-7 5 p. |
artikel |
106 |
What's up Doc?
|
Hinde, Stephen |
|
1996 |
|
5 |
p. 2-4 3 p. |
artikel |
107 |
Yeltsin announces ruling on protection of software
|
|
|
1993 |
|
5 |
p. 18- 1 p. |
artikel |