nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An IT fairy tale
|
Jessop, Gareth |
|
1996 |
1996 |
6 |
p. 27-29 3 p. |
artikel |
2 |
Assumptions, perceptions and false reassurances
|
Hinde, Stephen |
|
1996 |
1996 |
6 |
p. 2-4 3 p. |
artikel |
3 |
Events
|
|
|
1996 |
1996 |
6 |
p. 32- 1 p. |
artikel |
4 |
Global initiative for business continuity
|
|
|
1996 |
1996 |
6 |
p. 6- 1 p. |
artikel |
5 |
Impostors, eavesdroppers and vandals
|
|
|
1996 |
1996 |
6 |
p. 30-31 2 p. |
artikel |
6 |
Information security design principles for adaptive organizations
|
Lichtenstein, Sharman |
|
1996 |
1996 |
6 |
p. 7-15 9 p. |
artikel |
7 |
Laptops: The new target of the cyber-criminal
|
Bequai, August |
|
1996 |
1996 |
6 |
p. 22-26 5 p. |
artikel |
8 |
Orion chipset found to contain second bug
|
|
|
1996 |
1996 |
6 |
p. 6- 1 p. |
artikel |
9 |
Scale of transition to year 2000 underestimated
|
|
|
1996 |
1996 |
6 |
p. 5- 1 p. |
artikel |
10 |
Survey reveals PC networks are Achilles' heel of UK businesses
|
|
|
1996 |
1996 |
6 |
p. 6- 1 p. |
artikel |
11 |
The systems development audit
|
Nelms, Chris |
|
1996 |
1996 |
6 |
p. 16-21 6 p. |
artikel |
12 |
Virus damages to top $5 billion
|
|
|
1996 |
1996 |
6 |
p. 5- 1 p. |
artikel |