nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A beginner's guide to auditing Unix: Part 1
|
Nelms, Chris |
|
1993 |
|
9 |
p. 6-10 5 p. |
artikel |
2 |
A cautionary tale
|
Brown, Alex M. |
|
1993 |
|
9 |
p. 13-14 2 p. |
artikel |
3 |
Accredited certification against BS7799
|
DTI, |
|
1995 |
|
9 |
p. 18-19 2 p. |
artikel |
4 |
Bank of Scotland suffers serious hardware failure
|
|
|
1995 |
|
9 |
p. 19- 1 p. |
artikel |
5 |
Barclays offers FM helping hand to PC users
|
|
|
1993 |
|
9 |
p. 17- 1 p. |
artikel |
6 |
Benefit fraud
|
|
|
1996 |
|
9 |
p. 9- 1 p. |
artikel |
7 |
Better data security urged as legal loophole exposed in data protection legislation
|
|
|
1993 |
|
9 |
p. 14- 1 p. |
artikel |
8 |
Bug tracked down to Netware
|
|
|
1993 |
|
9 |
p. 16- 1 p. |
artikel |
9 |
Call for antihacking law after Knesset break-ins
|
|
|
1993 |
|
9 |
p. 16-17 2 p. |
artikel |
10 |
Canadian software pirate faces $50 000 fine
|
|
|
1993 |
|
9 |
p. 15- 1 p. |
artikel |
11 |
Change management: The business issues
|
Page, Angus |
|
1996 |
|
9 |
p. 10-20 11 p. |
artikel |
12 |
Class project pulls plug on electronic eavesdropping
|
|
|
1993 |
|
9 |
p. 19- 1 p. |
artikel |
13 |
Client server architectures and security
|
Pullen, David |
|
1992 |
|
9 |
p. 8-12 5 p. |
artikel |
14 |
COMPSEC international 1991
|
|
|
1991 |
|
9 |
p. 18-19 2 p. |
artikel |
15 |
Computer chips mean profits for high-tech thieves
|
|
|
1995 |
|
9 |
p. 17-18 2 p. |
artikel |
16 |
Computer security and control principles
|
Hinde, Stephen |
|
1993 |
|
9 |
p. 11-12 2 p. |
artikel |
17 |
Computer system makes SNCF go off the rails
|
|
|
1993 |
|
9 |
p. 17- 1 p. |
artikel |
18 |
Computer system misuse costs health insurer millions
|
|
|
1993 |
|
9 |
p. 16- 1 p. |
artikel |
19 |
Conducting A Financial Audit In An Automated Environment
|
Cerullo, Michael J. |
|
1997 |
|
9 |
p. 8-16 9 p. |
artikel |
20 |
Controversy over virus code-sharing on bulletin boards
|
|
|
1993 |
|
9 |
p. 18-19 2 p. |
artikel |
21 |
Corporate governance: Cadbury, Treadway, the Yellow Book and Barings
|
Hinde, Stephen |
|
1995 |
|
9 |
p. 1-5 5 p. |
artikel |
22 |
Dinosaurs, hype and the infosec bandwagon
|
Mcllwraith, Angus |
|
1993 |
|
9 |
p. 3-6 4 p. |
artikel |
23 |
Disasters: Past, Present and Millennium
|
Hinde, Stephen |
|
1997 |
|
9 |
p. 2-4 3 p. |
artikel |
24 |
Document management systems — How they affect your business
|
Hooles, Andrew |
|
1996 |
|
9 |
p. 25-28 4 p. |
artikel |
25 |
EC directive offers opportunity to update Data Protection Act for 21st Century
|
|
|
1996 |
|
9 |
p. 5- 1 p. |
artikel |
26 |
Editorial
|
|
|
1991 |
|
9 |
p. 1-2 2 p. |
artikel |
27 |
Editorial
|
|
|
1992 |
|
9 |
p. 1-4 4 p. |
artikel |
28 |
Editorial
|
|
|
1994 |
|
9 |
p. 1-2 2 p. |
artikel |
29 |
Events
|
|
|
1996 |
|
9 |
p. 32- 1 p. |
artikel |
30 |
Events
|
|
|
1995 |
|
9 |
p. 20- 1 p. |
artikel |
31 |
Events
|
|
|
1991 |
|
9 |
p. 24- 1 p. |
artikel |
32 |
Events
|
|
|
1992 |
|
9 |
p. 20- 1 p. |
artikel |
33 |
Events
|
|
|
1993 |
|
9 |
p. 20- 1 p. |
artikel |
34 |
Events
|
|
|
1994 |
|
9 |
p. 24- 1 p. |
artikel |
35 |
Expert claims Crest system could lead to another Barings disaster
|
|
|
1995 |
|
9 |
p. 19- 1 p. |
artikel |
36 |
Expert Systems for Computer and Management Information Systems Auditing
|
Wattiau, Isabelle Comn |
|
1997 |
|
9 |
p. 17-27 11 p. |
artikel |
37 |
Fire prevention in computer environments
|
Hiles, Andrew |
|
1991 |
|
9 |
p. 16-18 3 p. |
artikel |
38 |
Hackers change phone message in police department
|
|
|
1996 |
|
9 |
p. 6- 1 p. |
artikel |
39 |
Information as an asset—The board agenda
|
Horne, Nigel W. |
|
1995 |
|
9 |
p. 5-11 7 p. |
artikel |
40 |
Is Computer Misuse Still An Offence?
|
|
|
1997 |
|
9 |
p. 33-35 3 p. |
artikel |
41 |
Jurassic Park and computer disaster recovery
|
Hinde, Stephen |
|
1993 |
|
9 |
p. 1-3 3 p. |
artikel |
42 |
Lack of centralized security causes problems on SQL Server
|
|
|
1993 |
|
9 |
p. 19- 1 p. |
artikel |
43 |
LANs doomed by Doom
|
|
|
1994 |
|
9 |
p. 22- 1 p. |
artikel |
44 |
Laroux virus: bark worse than its byte?
|
|
|
1996 |
|
9 |
p. 9- 1 p. |
artikel |
45 |
Management considerations in data crime investigations
|
Bequai, August |
|
1996 |
|
9 |
p. 21-24 4 p. |
artikel |
46 |
More problems for NASDAQ
|
|
|
1994 |
|
9 |
p. 22-23 2 p. |
artikel |
47 |
NAO urges greater public data protection
|
|
|
1993 |
|
9 |
p. 14- 1 p. |
artikel |
48 |
News
|
|
|
1991 |
|
9 |
p. 19-23 5 p. |
artikel |
49 |
News
|
|
|
1992 |
|
9 |
p. 15-19 5 p. |
artikel |
50 |
NIST proposes Key escrow encryption standard
|
|
|
1993 |
|
9 |
p. 18- 1 p. |
artikel |
51 |
Oil rig's software gets the all clear
|
|
|
1994 |
|
9 |
p. 22- 1 p. |
artikel |
52 |
Organization B disaster recovery plan: Part 6
|
|
|
1994 |
|
9 |
p. 3-9 7 p. |
artikel |
53 |
Police crackdown on virus writers
|
|
|
1993 |
|
9 |
p. 15- 1 p. |
artikel |
54 |
Police practice makes perfect?
|
|
|
1996 |
|
9 |
p. 7- 1 p. |
artikel |
55 |
Poll shows widespread lack of back up facilities in US health sector
|
|
|
1993 |
|
9 |
p. 15- 1 p. |
artikel |
56 |
Poor backup facilities put hospital in critical condition
|
|
|
1993 |
|
9 |
p. 15- 1 p. |
artikel |
57 |
Project failures and how to avoid them
|
Williams, Paul |
|
1996 |
|
9 |
p. 29-31 3 p. |
artikel |
58 |
Security issues in system development
|
Price, G.R. |
|
1992 |
|
9 |
p. 4-8 5 p. |
artikel |
59 |
Small data centres can perform better than large ones
|
|
|
1996 |
|
9 |
p. 8- 1 p. |
artikel |
60 |
Small insect holds back rocket
|
|
|
1994 |
|
9 |
p. 22- 1 p. |
artikel |
61 |
Software piracy concern over anticipated changes to Japanese copyright law
|
|
|
1993 |
|
9 |
p. 18- 1 p. |
artikel |
62 |
Systems at speed—Rapid application development in 1995
|
Hutt, Ed |
|
1995 |
|
9 |
p. 11-17 7 p. |
artikel |
63 |
Technical (EDP) auditing
|
van Biene-Hershey, M.E. |
|
1991 |
|
9 |
p. 2-10 9 p. |
artikel |
64 |
The failure, the disaster and the court case
|
Hinde, Stephen |
|
1996 |
|
9 |
p. 2-4 3 p. |
artikel |
65 |
The psychology of computer crime — Part 1
|
Buckner, Kathy |
|
1992 |
|
9 |
p. 12-15 4 p. |
artikel |
66 |
The trend with BS7799
|
|
|
1996 |
|
9 |
p. 5- 1 p. |
artikel |
67 |
Three-quarters of home software is illegally copied by users
|
|
|
1995 |
|
9 |
p. 18- 1 p. |
artikel |
68 |
Trillion release new audit and security software tool
|
|
|
1994 |
|
9 |
p. 23- 1 p. |
artikel |
69 |
UK health authority admits to software piracy
|
|
|
1993 |
|
9 |
p. 17- 1 p. |
artikel |
70 |
Untested software to blame for failed Ariane 5 launch
|
|
|
1996 |
|
9 |
p. 8- 1 p. |
artikel |
71 |
Use of data dictionaries for audit and control purposes
|
Mollema, Kornelis Y. |
|
1991 |
|
9 |
p. 10-16 7 p. |
artikel |
72 |
Vax data corruption detection tool out on Windows NT
|
|
|
1993 |
|
9 |
p. 18- 1 p. |
artikel |
73 |
Virus epidemic in Japan
|
|
|
1993 |
|
9 |
p. 15-16 2 p. |
artikel |
74 |
Wessex chief quits to focus on NHS role
|
|
|
1993 |
|
9 |
p. 17- 1 p. |
artikel |
75 |
What's happening in EDP audit in Australasia
|
Parkes, Hugh |
|
1993 |
|
9 |
p. 10-11 2 p. |
artikel |
76 |
What's new in the ICL world?
|
Lawes, A. |
|
1994 |
|
9 |
p. 10-21 12 p. |
artikel |
77 |
Why Stealing Proprietary Data Pays: Challenges for Management in Cyber-Space
|
Bequai, August |
|
1997 |
|
9 |
p. 28-32 5 p. |
artikel |
78 |
Y2K test service launched
|
|
|
1996 |
|
9 |
p. 6- 1 p. |
artikel |