Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             179 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abstracts & Commentaries 1988
12 p. 17-20
artikel
2 Abstracts & Commentaries 1984
12 p. 13-20
artikel
3 Abstracts & Commentaries 1977
12 p. 16-20
artikel
4 Abstracts & Commentaries 1980
12 p. 13-20
artikel
5 Abstracts & Commentaries 1983
12 p. 17-20
artikel
6 Abstracts & Commentaries 1974
12 p. 14-20
artikel
7 Abstracts & Commentaries 1976
12 p. 17-20
artikel
8 Abstracts & Commentaries 1979
12 p. 15-20
artikel
9 Abstracts & Commentaries 1986
12 p. 15-20
artikel
10 Abstracts & Commentaries 1987
12 p. 20
artikel
11 Abstracts & Commentaries 1975
12 p. 18-20
artikel
12 Abstracts & Commentaries 1982
12 p. 17-20
artikel
13 Abstracts & Commentaries 1978
12 p. 9-20
artikel
14 Abstracts & Commentaries 1981
12 p. 14-20
artikel
15 Abstracts & Commentary 1989
12 p. 19-20
artikel
16 Abstracts & Commentary 1991
12 p. 16-17
artikel
17 Abstracts & Commentary 1992
12 p. 15-17
artikel
18 Abstracts & Commentary 1997
12 p. 17-18
artikel
19 Abstracts & Commentary 1994
12 p. 16-17
artikel
20 Abstracts & Commentary 1995
12 p. 17-19
artikel
21 Abstracts & Commentary 1990
12 p. 15-17
artikel
22 Abstracts & Commentary 1993
12 p. 18-19
artikel
23 Abstracts & Commentary 1996
12 p. 19-20
artikel
24 Accountability in EDI Systems to Prevent Employee Fraud Smith, Alan D.
2005
12 p. 1-13
artikel
25 101 Acl [Audit Command Language] Applications: A Toolkit for Today's Auditor, Second Edition Lanza, Richard
1998
12 p. 14
artikel
26 A Methodology for Auditing Project Development Fitzgerald, Thomas H.
1976
12 p. 1-15
artikel
27 An Introduction to Sap R/3 for is Auditors Ashton, Bob
2000
12 p. 1-11
artikel
28 A Review of the 1994 Revision of the US Government Auditing Standards Borthick, A. Faye
1995
12 p. 5-14
artikel
29 A Secure Electronic Document Audit Trail Product Menkus, Belden
1995
12 p. 15-16
artikel
30 Audit Concerns with Local Area Networks Sobol, Michael I.
1987
12 p. 6-9
artikel
31 Auditing Point-of-Sale Systems Thiessen, James H.
1988
12 p. 6-10
artikel
32 Auditing the Change Control System Yarberry, William A.
1984
12 p. 1-5
artikel
33 Auditing The Effectiveness of The Design of A Web Page Menkus, Belden
2000
12 p. 1-3
artikel
34 Auditing the IBM AS/400: The Johnson & Johnson Automated Approach Sarkar, Salil
1991
12 p. 1-6
artikel
35 Auditing the MVS Operating System Hardenburg, Kurt L.
1980
12 p. 1-11
artikel
36 Audit Uses of the Microcomputer Cotter, John L.
1986
12 p. 1-4
artikel
37 Basic Protection for Microcomputers Gascoyne, Rodney J. N.
1986
12 p. 5-6
artikel
38 Best Practices in Internet Commerce Security: A Standard of Due Care Requirements List for Merchants Cresson, Charles
2000
12 p. 1
artikel
39 Biometrics Technology Comes of Age Robb, Drew
2002
12 p. 12-20
artikel
40 Book Review 1986
12 p. 14
artikel
41 Book Review 1987
12 p. 14-19
artikel
42 Book Review 1976
12 p. 16-17
artikel
43 Book Reviews 1989
12 p. 20
artikel
44 Book Reviews 1990
12 p. 18-20
artikel
45 Book Reviews 1984
12 p. 10-12
artikel
46 Book Reviews 1991
12 p. 14-16
artikel
47 Briefs 1974
12 p. 12
artikel
48 Commentary: The Need to Define Client/Server Cost and Charge Back 1998
12 p. 16
artikel
49 Commentary: The Telecommunication Environment was not Designed for the Internet 2001
12 p. 18
artikel
50 Companies Still Struggling to Comply with the Sarbanes-Oxley Act of 2002 and Other Legal and Regulatory Requirements 2005
12 p. 19-20
artikel
51 Computer Disasters and Their Business Impact Wong, Ken
1987
12 p. 1-6
artikel
52 Computer-Related Fraud in the U.K. Wong, Kenneth K.
1984
12 p. 5-9
artikel
53 Computer Viruses Can Be Deadly! Highland, Harold Joseph
1988
12 p. 1-6
artikel
54 Conference Report 1975
12 p. 10-17
artikel
55 Configuring Cisco Denial-of-Service Security Features, Part 1 Davis, Peter T.
2002
12 p. 1-11
artikel
56 Consolidating User Credentials into a Single Identity and Protecting this with Multi-Factor Authentication can Avert Online Fraud 2005
12 p. 18-19
artikel
57 Continuity of Business in the Face of Y2K Date Problem Kordahl, Eugene
1999
12 p. 1-10
artikel
58 Controlling Separation of Duties to Prevent Document Fraud Russell, Selwyn
1994
12 p. 6-15
artikel
59 Corporate Governance, Recruitment, and ISO/IEC 17799 Ashton, Bob
2003
12 p. 18-20
artikel
60 Correction 1977
12 p. 14
artikel
61 D.C. Government Unclear on Total Due for Telecommunication Services Julian, Alfred
1999
12 p. 10-14
artikel
62 Deciphering (Electricity) Deregulation Tatum, Rita
2000
12 p. 1
artikel
63 Developing End-User Computing Guidelines Bigler, Mark
1995
12 p. 1-5
artikel
64 Disaster Recovery Using Real-Time Disk Data Copy Mikkelsen, Claus
1999
12 p. 14
artikel
65 Disaster Recovery Yellow Pages Lewis, Steven
1999
12 p. 17
artikel
66 Distributed Data Processing: Internal Control Issues and Safeguards Kneer, Dan C.
1983
12 p. 1-14
artikel
67 Editorial Weiss, Harold
1974
12 p. 13
artikel
68 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 14, Number 12 1987
12 p. 1
artikel
69 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 19, Number 12 1992
12 p. 1
artikel
70 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 24, Number 12 1997
12 p. 1
artikel
71 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 10, Number 12 1983
12 p. 1
artikel
72 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 13, Number 12 1986
12 p. 1
artikel
73 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 12, Number 12 1985
12 p. 1
artikel
74 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 20, Number 12 1993
12 p. 1
artikel
75 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 22, Number 12 1995
12 p. 1
artikel
76 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 2, Number 12 1975
12 p. 1
artikel
77 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 4, Number 12 1977
12 p. 1
artikel
78 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 6, Number 12 1979
12 p. 1
artikel
79 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 8, Number 12 1981
12 p. 1
artikel
80 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 15, Number 12 1988
12 p. 1
artikel
81 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 23, Number 12 1996
12 p. 1
artikel
82 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 16, Number 12 1989
12 p. 1
artikel
83 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 17, Number 12 1990
12 p. 1
artikel
84 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 18, Number 12 1991
12 p. 1
artikel
85 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 3, Number 12 1976
12 p. 1
artikel
86 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 7, Number 12 1980
12 p. 1
artikel
87 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 9, Number 12 1982
12 p. 1
artikel
88 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 11, Number 12 1984
12 p. 1
artikel
89 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 1, Number 12 1974
12 p. 1
artikel
90 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 21, Number 12 1994
12 p. 1
artikel
91 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 5, Number 12 1978
12 p. 1
artikel
92 Effective Operational Security Metrics Ravenel, J. Patrick
2006
12 p. 10-19
artikel
93 EFT Errors — Untraceable and Unfixable 1981
12 p. 8-9
artikel
94 Entering a New Era in is Audit and Control Donahue, Michael
1994
12 p. 1-5
artikel
95 Equity Funding Auditors Convicted 1975
12 p. 17
artikel
96 Establishing an EDP Audit Function Hubbert, James F.
1982
12 p. 9-14
artikel
97 Extending the Edge of the Enterprises: Technologies and Trends in Corporate Remote Acces Kuepper, Mark
1999
12 p. 14-15
artikel
98 Fighting Spyware and Adware in the Enterprise Gordon, Sarah
2005
12 p. 14-18
artikel
99 From Logs to Logic: Best Practices for Security Information Management Hellman, Gretchen
2006
12 p. 1-10
artikel
100 Future Development in EDP Auditing Weiss, Harold
1977
12 p. 1-14
artikel
101 Growing a Knowledge Management System Mullich, Joe
2001
12 p. 17
artikel
102 IBM Program Products for Systems Audits & Tests Adams, Donald L.
1975
12 p. 1-9
artikel
103 Information Security Management Tipton, Harold
2000
12 p. 1
artikel
104 Information Systems Quality Assurance Enhances Information Systems Security Menkus, Belden
1990
12 p. 6-10
artikel
105 Integration Issues: Back-Office Discipline Moves To The Front Lines Sharp, Kevin
2001
12 p. 17-18
artikel
106 In the News 1979
12 p. 9-13
artikel
107 Issues in Electronic Records Management Menkus, Belden
2001
12 p. 1-11
artikel
108 Load Library Auditing in OS/VS1 and OS/VS2 Environments Dennis, G. Claude
1981
12 p. 1-7
artikel
109 Long Term Data Preservation Moore, Fred
2000
12 p. 1
artikel
110 Of Interest 1989
12 p. 18
artikel
111 Of Interest 1990
12 p. 10-15
artikel
112 Of Interest 1991
12 p. 18-20
artikel
113 Of Interest 1992
12 p. 17-20
artikel
114 Of Interest 1997
12 p. 19-20
artikel
115 Of Interest 1986
12 p. 9-13
artikel
116 Of Interest 1994
12 p. 17-20
artikel
117 Of Interest 1999
12 p. 17-20
artikel
118 Of Interest 1980
12 p. 11-12
artikel
119 Of Interest 1981
12 p. 11-12
artikel
120 Of Interest 1983
12 p. 15
artikel
121 Of Interest 1993
12 p. 19-20
artikel
122 Of Interest 1995
12 p. 19-20
artikel
123 Of Interest 1987
12 p. 10-14
artikel
124 Of Interest 1988
12 p. 15-17
artikel
125 Of Interest 1998
12 p. 17-20
artikel
126 Of Interest 2006
12 p. 22-24
artikel
127 Of Interest 1996
12 p. 20
artikel
128 Of Interest 2000
12 p. 1
artikel
129 Of Interest 2001
12 p. 18-20
artikel
130 Of Interest 1978
12 p. 6-8
artikel
131 Of Interest 1982
12 p. 16-17
artikel
132 One Letter Too Many from Mastercard Minardi, Ray
1999
12 p. 16-17
artikel
133 Performance Measurement in EDP 1974
12 p. 1-12
artikel
134 Practical Guide for Implementing Secure Intranets and Extranets Phaltankar, Kaustubh
2000
12 p. 1-2
artikel
135 Preventing Failure: The Value of Performing A Single Point of Failure Analysis for Critical Applications and Systems Wolf, Laurence J.
2004
12 p. 14-18
artikel
136 Product News 1981
12 p. 9-10
artikel
137 QA: What it is, What it Does Meredith, Denis C.
1988
12 p. 10-15
artikel
138 RACF-A Program to Enhance Security and Control Brown, Donna
1979
12 p. 1-9
artikel
139 Racf Meets Unix in Open Edition MVS Hahn, Mark
1997
12 p. 1-16
artikel
140 Reader Feedback 1987
12 p. 14
artikel
141 Reader Feedback 1983
12 p. 16-17
artikel
142 Reader Feedback 1979
12 p. 14
artikel
143 Reader Feedback 1976
12 p. 16
artikel
144 Reader Feedback 1982
12 p. 15
artikel
145 Reader Feedback 1986
12 p. 13
artikel
146 Reader Feedback 1977
12 p. 15
artikel
147 Reader Feedback Woodworth, Anthony J.
1978
12 p. 9
artikel
148 Reader Feedback 1981
12 p. 13
artikel
149 Review 1993
12 p. 17
artikel
150 Saving Users from Themselves Fulton, Jim
2006
12 p. 20-21
artikel
151 Securing Private Data on Insecure Public Networks Brodsky, Ira
1990
12 p. 1-6
artikel
152 Security Controls for a Client/Server Environment Bayuk, Jennifer
1996
12 p. 1-9
artikel
153 Security/Privacy Compliance: Culture Change Guenther, Melissa
2004
12 p. 19-24
artikel
154 Set Phasers On Stun, Mr. Spock: Taking Aim at the Control Implications of Wireless Networks Howells, Mark
1993
12 p. 1-13
artikel
155 Support Tool Reviews 1992
12 p. 13-15
artikel
156 Support Tool Reviews 1994
12 p. 15-16
artikel
157 Support Tool Reviews 1995
12 p. 17
artikel
158 Support Tool Reviews 1996
12 p. 18-19
artikel
159 Support Tool Reviews 1997
12 p. 16-17
artikel
160 Systems Development Priorities Nogle, Warren G.
1978
12 p. 1-6
artikel
161 Taking an Adaptive Approach to is Security Klaus, Christopher
1998
12 p. 1-14
artikel
162 The Auditor's Role in Applications Software Development-Revisited Vallabhaneni, S. Rao
1991
12 p. 7-14
artikel
163 The Auditor's Role in Securing E-Business Systems Cerullo, Michael J.
2004
12 p. 1-13
artikel
164 The Auditor's Use of SMF Cassidy, Michael
1989
12 p. 1-18
artikel
165 The Dummy Entity, a Valuable Audit Tool Gliezner, Shmuel
1985
12 p. 1-20
artikel
166 The Effect of SAS No. 48 on Financial and EDP Auditors Reilly, Robert F.
1986
12 p. 6-9
artikel
167 The Information Systems Security Policy Statement Henderson, Stuart
1996
12 p. 9-18
artikel
168 The Legacy Continues Nevins, Scott
1998
12 p. 15-16
artikel
169 Tornado, Wind, and Water Protection: Preparing for the Expected Waller, James
2001
12 p. 12-16
artikel
170 Understanding Local Area Network Security Seyfert, Judith
1992
12 p. 1-13
artikel
171 Understand Password Strength Poore, Ralph Spencer
1993
12 p. 13-17
artikel
172 Using BTS to Test Advanced Systems Campbell, Kingsley
1982
12 p. 1-8
artikel
173 Using Statistical Sampling Conley, Harry
1999
12 p. 17
artikel
174 Using the Trotter Matrix to Measure and Improve Project Manager Performance Carroll, Charlie
2003
12 p. 1-17
artikel
175 Virtual Private Networks for the Enterprise Becker, Mark
2000
12 p. 1-2
artikel
176 Web Psychos, Stalkers and Pranksters: How to Protect Yourself in Cyberspace Banks, Michael
1998
12 p. 14
artikel
177 While A Burden for Corporate it, Regulatory Compliance Creates Significant Opportunities for it Vendors 2005
12 p. 20
artikel
178 Year 2000 Crapshoot? Silver, Kenneth
1998
12 p. 15
artikel
179 Your Voiceprint Will be Your Key Mammone, Richard
1998
12 p. 16
artikel
                             179 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland