Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             78 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A beginner's guide to auditing Unix: Part 1 Nelms, Chris
1993
9 p. 6-10
5 p.
artikel
2 A cautionary tale Brown, Alex M.
1993
9 p. 13-14
2 p.
artikel
3 Accredited certification against BS7799 DTI,
1995
9 p. 18-19
2 p.
artikel
4 Bank of Scotland suffers serious hardware failure 1995
9 p. 19-
1 p.
artikel
5 Barclays offers FM helping hand to PC users 1993
9 p. 17-
1 p.
artikel
6 Benefit fraud 1996
9 p. 9-
1 p.
artikel
7 Better data security urged as legal loophole exposed in data protection legislation 1993
9 p. 14-
1 p.
artikel
8 Bug tracked down to Netware 1993
9 p. 16-
1 p.
artikel
9 Call for antihacking law after Knesset break-ins 1993
9 p. 16-17
2 p.
artikel
10 Canadian software pirate faces $50 000 fine 1993
9 p. 15-
1 p.
artikel
11 Change management: The business issues Page, Angus
1996
9 p. 10-20
11 p.
artikel
12 Class project pulls plug on electronic eavesdropping 1993
9 p. 19-
1 p.
artikel
13 Client server architectures and security Pullen, David
1992
9 p. 8-12
5 p.
artikel
14 COMPSEC international 1991 1991
9 p. 18-19
2 p.
artikel
15 Computer chips mean profits for high-tech thieves 1995
9 p. 17-18
2 p.
artikel
16 Computer security and control principles Hinde, Stephen
1993
9 p. 11-12
2 p.
artikel
17 Computer system makes SNCF go off the rails 1993
9 p. 17-
1 p.
artikel
18 Computer system misuse costs health insurer millions 1993
9 p. 16-
1 p.
artikel
19 Conducting A Financial Audit In An Automated Environment Cerullo, Michael J.
1997
9 p. 8-16
9 p.
artikel
20 Controversy over virus code-sharing on bulletin boards 1993
9 p. 18-19
2 p.
artikel
21 Corporate governance: Cadbury, Treadway, the Yellow Book and Barings Hinde, Stephen
1995
9 p. 1-5
5 p.
artikel
22 Dinosaurs, hype and the infosec bandwagon Mcllwraith, Angus
1993
9 p. 3-6
4 p.
artikel
23 Disasters: Past, Present and Millennium Hinde, Stephen
1997
9 p. 2-4
3 p.
artikel
24 Document management systems — How they affect your business Hooles, Andrew
1996
9 p. 25-28
4 p.
artikel
25 EC directive offers opportunity to update Data Protection Act for 21st Century 1996
9 p. 5-
1 p.
artikel
26 Editorial 1991
9 p. 1-2
2 p.
artikel
27 Editorial 1992
9 p. 1-4
4 p.
artikel
28 Editorial 1994
9 p. 1-2
2 p.
artikel
29 Events 1996
9 p. 32-
1 p.
artikel
30 Events 1995
9 p. 20-
1 p.
artikel
31 Events 1991
9 p. 24-
1 p.
artikel
32 Events 1992
9 p. 20-
1 p.
artikel
33 Events 1993
9 p. 20-
1 p.
artikel
34 Events 1994
9 p. 24-
1 p.
artikel
35 Expert claims Crest system could lead to another Barings disaster 1995
9 p. 19-
1 p.
artikel
36 Expert Systems for Computer and Management Information Systems Auditing Wattiau, Isabelle Comn
1997
9 p. 17-27
11 p.
artikel
37 Fire prevention in computer environments Hiles, Andrew
1991
9 p. 16-18
3 p.
artikel
38 Hackers change phone message in police department 1996
9 p. 6-
1 p.
artikel
39 Information as an asset—The board agenda Horne, Nigel W.
1995
9 p. 5-11
7 p.
artikel
40 Is Computer Misuse Still An Offence? 1997
9 p. 33-35
3 p.
artikel
41 Jurassic Park and computer disaster recovery Hinde, Stephen
1993
9 p. 1-3
3 p.
artikel
42 Lack of centralized security causes problems on SQL Server 1993
9 p. 19-
1 p.
artikel
43 LANs doomed by Doom 1994
9 p. 22-
1 p.
artikel
44 Laroux virus: bark worse than its byte? 1996
9 p. 9-
1 p.
artikel
45 Management considerations in data crime investigations Bequai, August
1996
9 p. 21-24
4 p.
artikel
46 More problems for NASDAQ 1994
9 p. 22-23
2 p.
artikel
47 NAO urges greater public data protection 1993
9 p. 14-
1 p.
artikel
48 News 1991
9 p. 19-23
5 p.
artikel
49 News 1992
9 p. 15-19
5 p.
artikel
50 NIST proposes Key escrow encryption standard 1993
9 p. 18-
1 p.
artikel
51 Oil rig's software gets the all clear 1994
9 p. 22-
1 p.
artikel
52 Organization B disaster recovery plan: Part 6 1994
9 p. 3-9
7 p.
artikel
53 Police crackdown on virus writers 1993
9 p. 15-
1 p.
artikel
54 Police practice makes perfect? 1996
9 p. 7-
1 p.
artikel
55 Poll shows widespread lack of back up facilities in US health sector 1993
9 p. 15-
1 p.
artikel
56 Poor backup facilities put hospital in critical condition 1993
9 p. 15-
1 p.
artikel
57 Project failures and how to avoid them Williams, Paul
1996
9 p. 29-31
3 p.
artikel
58 Security issues in system development Price, G.R.
1992
9 p. 4-8
5 p.
artikel
59 Small data centres can perform better than large ones 1996
9 p. 8-
1 p.
artikel
60 Small insect holds back rocket 1994
9 p. 22-
1 p.
artikel
61 Software piracy concern over anticipated changes to Japanese copyright law 1993
9 p. 18-
1 p.
artikel
62 Systems at speed—Rapid application development in 1995 Hutt, Ed
1995
9 p. 11-17
7 p.
artikel
63 Technical (EDP) auditing van Biene-Hershey, M.E.
1991
9 p. 2-10
9 p.
artikel
64 The failure, the disaster and the court case Hinde, Stephen
1996
9 p. 2-4
3 p.
artikel
65 The psychology of computer crime — Part 1 Buckner, Kathy
1992
9 p. 12-15
4 p.
artikel
66 The trend with BS7799 1996
9 p. 5-
1 p.
artikel
67 Three-quarters of home software is illegally copied by users 1995
9 p. 18-
1 p.
artikel
68 Trillion release new audit and security software tool 1994
9 p. 23-
1 p.
artikel
69 UK health authority admits to software piracy 1993
9 p. 17-
1 p.
artikel
70 Untested software to blame for failed Ariane 5 launch 1996
9 p. 8-
1 p.
artikel
71 Use of data dictionaries for audit and control purposes Mollema, Kornelis Y.
1991
9 p. 10-16
7 p.
artikel
72 Vax data corruption detection tool out on Windows NT 1993
9 p. 18-
1 p.
artikel
73 Virus epidemic in Japan 1993
9 p. 15-16
2 p.
artikel
74 Wessex chief quits to focus on NHS role 1993
9 p. 17-
1 p.
artikel
75 What's happening in EDP audit in Australasia Parkes, Hugh
1993
9 p. 10-11
2 p.
artikel
76 What's new in the ICL world? Lawes, A.
1994
9 p. 10-21
12 p.
artikel
77 Why Stealing Proprietary Data Pays: Challenges for Management in Cyber-Space Bequai, August
1997
9 p. 28-32
5 p.
artikel
78 Y2K test service launched 1996
9 p. 6-
1 p.
artikel
                             78 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland