Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             107 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Air Traffic software delays 1997
5 p. 9-
1 p.
artikel
2 Alberta Stock Exchange hit again by IT outage 1997
5 p. 6-
1 p.
artikel
3 Auditing and security Blatchford, Clive
1989
5 p. 2-7
6 p.
artikel
4 Auditing mainframe-based end-user systems Le Grand, Charles H.
1992
5 p. 7-14
8 p.
artikel
5 Bankers propose new Code of Practice 1997
5 p. 10-
1 p.
artikel
6 Bank gives porn pushers stiff penalties 1997
5 p. 6-
1 p.
artikel
7 Be prepared Pounder, Chris
1996
5 p. 29-30
2 p.
artikel
8 Beyond the rainbow books Blatchford, Clive
1991
5 p. 3-11
9 p.
artikel
9 Boy gets unsolicited porn by E-mail 1997
5 p. 7-
1 p.
artikel
10 Business and auditing impact of new technologies: Part 2 Le Grand, Charles
1997
5 p. 20-24
5 p.
artikel
11 Business continuity planning: Part 1 Hearnden, Keith
1995
5 p. 3-10
8 p.
artikel
12 Business networking and the Internet Blatchford, Clive
1997
5 p. 11-19
9 p.
artikel
13 Business on the Internet: UK perspectives Parry, Rex
1996
5 p. 27-28
2 p.
artikel
14 Can an employer monitor its employees' E-mail? Miller, Nigel
1997
5 p. 30-31
2 p.
artikel
15 Caustic fluid dissolves computer 1994
5 p. 23-
1 p.
artikel
16 Chase Manhattan keystroke error affects thousands 1996
5 p. 7-
1 p.
artikel
17 China executes hacker 1993
5 p. 18-
1 p.
artikel
18 COMPACS '92 Bentley, David
1992
5 p. 14-18
5 p.
artikel
19 Conference report — CACS '93 Croxford, Ivan
1993
5 p. 13-15
3 p.
artikel
20 Conference report —CCOMPACS '93 Bentley, D.F.
1993
5 p. 10-13
4 p.
artikel
21 Corporate web site from CIMA 1996
5 p. 9-
1 p.
artikel
22 Could you cope without computers? Sadiwnyk, Mike
1995
5 p. 13-16
4 p.
artikel
23 Data matching bill rushes into law 1997
5 p. 9-
1 p.
artikel
24 Data Protection Act ruling spotlights accountants 1993
5 p. 17-
1 p.
artikel
25 DOS virus scan disappointing 1993
5 p. 17-
1 p.
artikel
26 DTI issue consultative document on security evaluation 1989
5 p. 17-20
4 p.
artikel
27 Earthquake-hit company downsizes computer system 1995
5 p. 16-
1 p.
artikel
28 EDI and accounting Vahtera, Pauli
1996
5 p. 10-18
9 p.
artikel
29 Editorial 1991
5 p. 1-3
3 p.
artikel
30 Editorial Hinde, S.V.
1992
5 p. 1-2
2 p.
artikel
31 Editorial Hinde, Steven
1994
5 p. 1-3
3 p.
artikel
32 Editorial Hinde, Stephen
1993
5 p. 1-3
3 p.
artikel
33 Editorial 1989
5 p. 1-
1 p.
artikel
34 Editorial 1990
5 p. 1-2
2 p.
artikel
35 EU immigration monitoring system crashes 1995
5 p. 16-17
2 p.
artikel
36 Events 1997
5 p. 32-
1 p.
artikel
37 Events 1995
5 p. 20-
1 p.
artikel
38 Events 1991
5 p. 23-24
2 p.
artikel
39 Events 1993
5 p. 20-
1 p.
artikel
40 Events 1994
5 p. 24-
1 p.
artikel
41 Events 1992
5 p. 20-
1 p.
artikel
42 Events 1989
5 p. 23-
1 p.
artikel
43 Events 1990
5 p. 23-24
2 p.
artikel
44 Firm tests out its disaster recovery plan 1996
5 p. 6-
1 p.
artikel
45 Forthcoming events relevant to computer audit, security and controlelevant to computer audit, 1996
5 p. 36-
1 p.
artikel
46 From corner teashop to Internet cafe Hinde, Stephen
1997
5 p. 2-5
4 p.
artikel
47 Further business continuity development needed in many businesses 1996
5 p. 7-
1 p.
artikel
48 Glitch elevates misdemeanours 1997
5 p. 6-
1 p.
artikel
49 Hackers and phone phreaks: Preventing telecom frauds Bequai, August
1997
5 p. 25-29
5 p.
artikel
50 Hackers break into Quebec premier's office 1993
5 p. 19-
1 p.
artikel
51 Hackers imprisoned under Computer Misuse Act 1993
5 p. 16-
1 p.
artikel
52 Hands-on experience in dealing with a virus attack 1996
5 p. 6-
1 p.
artikel
53 IBM launch PC LAN recovery service 1993
5 p. 19-
1 p.
artikel
54 Industry grumbles Clipper Chips 1993
5 p. 16-17
2 p.
artikel
55 Information systems security — the last five years 1994
5 p. 18-22
5 p.
artikel
56 Internet naming plan signed 1997
5 p. 7-
1 p.
artikel
57 Internet shows its mettle in face of disaster 1995
5 p. 17-18
2 p.
artikel
58 IRS comes under scrutiny 1997
5 p. 7-
1 p.
artikel
59 IT causes stress, and offers a solution? 1993
5 p. 19-
1 p.
artikel
60 IT security evaluation manual — The current status 1992
5 p. 3-7
5 p.
artikel
61 It security testing, a practical guide— part 7 Robertson, Bernard
1993
5 p. 6-10
5 p.
artikel
62 London Fire Brigade gets its fingers burnt 1993
5 p. 18-
1 p.
artikel
63 Methodology for conducting a security review Fitzgerald, Jerry
1989
5 p. 8-11
4 p.
artikel
64 Millennium bomb continues to trouble UK Szweda, Roy
1997
5 p. 8-
1 p.
artikel
65 More illegal software users caught 1997
5 p. 10-
1 p.
artikel
66 MORI survey shows switch to outsourcing 1993
5 p. 19-
1 p.
artikel
67 Most organizations yet to define a Year 2000 strategy 1996
5 p. 6-
1 p.
artikel
68 MPs criticise security of UK lottery 1997
5 p. 9-
1 p.
artikel
69 NAO report exposes inadequate MOD system 1993
5 p. 17-
1 p.
artikel
70 Net pottering: Internet security 1996
5 p. 31-32
2 p.
artikel
71 Network failures prevented 1994
5 p. 23-
1 p.
artikel
72 New computer system causes chaos in Germany Gliss, Hans
1995
5 p. 17-
1 p.
artikel
73 New guidance notes from data protection registrar Bentley, David
1996
5 p. 8-9
2 p.
artikel
74 News 1991
5 p. 19-23
5 p.
artikel
75 News 1992
5 p. 18-19
2 p.
artikel
76 News 1989
5 p. 17-20
4 p.
artikel
77 News 1990
5 p. 17-22
6 p.
artikel
78 News 1989
5 p. 16-
1 p.
artikel
79 News 1989
5 p. 7-
1 p.
artikel
80 New version of recovery management tool for DB2 announced 1995
5 p. 19-
1 p.
artikel
81 OECD crypto guidelines 1997
5 p. 9-
1 p.
artikel
82 Opposition party claim report exposes UK government IT security shambles 1995
5 p. 16-
1 p.
artikel
83 Organization B disaster recovery plan: Part 2 1994
5 p. 7-17
11 p.
artikel
84 Paul Bedworth: The barrister's tale Kelman, Alistair
1993
5 p. 3-6
4 p.
artikel
85 Product review Oliphant, Alan
1989
5 p. 12-16
5 p.
artikel
86 Product reviews 1991
5 p. 15-18
4 p.
artikel
87 Publications 1990
5 p. 22-23
2 p.
artikel
88 RACF 1.9 enhancements Oliphant, Alan S.
1991
5 p. 11-15
5 p.
artikel
89 Regina-v-Brown: A Snooper's charter? Rebeiro, Michael
1996
5 p. 33-35
3 p.
artikel
90 Safety critical software that was not that safe Hinde, Stephen
1995
5 p. 1-3
3 p.
artikel
91 SAP: Changing risks, internal controls and fraud prevention Iyer, Nigel
1996
5 p. 19-22
4 p.
artikel
92 Secure UNIX—improved administrative control 1990
5 p. 2-6
5 p.
artikel
93 Security in computing 1991
5 p. 18-
1 p.
artikel
94 Security package keeps unauthorized users off the Net 1996
5 p. 9-
1 p.
artikel
95 Security specialist launches new IT risk analysis service 1995
5 p. 19-
1 p.
artikel
96 Summer school on IT audit, control and security 1995
5 p. 18-19
2 p.
artikel
97 Syntegra provide disaster recovery service 1994
5 p. 23-
1 p.
artikel
98 Taiwan seeks to introduce intellectual property guidelines 1993
5 p. 18-
1 p.
artikel
99 The auditor's fight against fraud Pounder, Chris
1996
5 p. 5-
1 p.
artikel
100 The embattled Internet Bequai, August
1996
5 p. 23-26
4 p.
artikel
101 The management and control of system security Halliden, Paul
1990
5 p. 7-17
11 p.
artikel
102 The safety of Sizewell 1994
5 p. 23-
1 p.
artikel
103 TUPE no protection in FM deals 1993
5 p. 18-
1 p.
artikel
104 Unfair contracts: New European directive to deliver more power to the consumer's elbow? Davis, Dai
1995
5 p. 10-13
4 p.
artikel
105 Unix — checking for exposures 1994
5 p. 3-7
5 p.
artikel
106 What's up Doc? Hinde, Stephen
1996
5 p. 2-4
3 p.
artikel
107 Yeltsin announces ruling on protection of software 1993
5 p. 18-
1 p.
artikel
                             107 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland