Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             204 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abstracts 1973
2 p. 16-20
artikel
2 Abstracts & Commentaries 1983
2 p. 15-20
artikel
3 Abstracts & Commentaries 1984
2 p. 14-20
artikel
4 Abstracts & Commentaries 1977
2 p. 12-20
artikel
5 Abstracts & Commentaries 1980
2 p. 14-20
artikel
6 Abstracts & Commentaries 1986
2 p. 17-20
artikel
7 Abstracts & Commentaries 1987
2 p. 17-20
artikel
8 Abstracts & Commentaries 1975
2 p. 13-20
artikel
9 Abstracts & Commentaries 1978
2 p. 11-19
artikel
10 Abstracts & Commentaries 1985
2 p. 17-19
artikel
11 Abstracts & Commentaries 1988
2 p. 19-20
artikel
12 Abstracts & Commentaries 1979
2 p. 17-20
artikel
13 Abstracts & Commentaries 1982
2 p. 17-20
artikel
14 Abstracts & Commentaries 1974
2 p. 15-20
artikel
15 Abstracts & Commentaries 1976
2 p. 13-19
artikel
16 Abstracts & Commentary 1989
2 p. 17-19
artikel
17 Abstracts & Commentary 1995
2 p. 15-17
artikel
18 Abstracts & Commentary 1992
2 p. 17-18
artikel
19 Abstracts & Commentary 1994
2 p. 15-17
artikel
20 Abstracts & Commentary 2002
2 p. 18-20
artikel
21 Abstracts & Commentary 1990
2 p. 16-18
artikel
22 Abstracts & Commentary 1997
2 p. 18-19
artikel
23 Abstracts & Commentary 1991
2 p. 17-19
artikel
24 Abstracts & Commentary 1993
2 p. 16-18
artikel
25 Abstracts & Commentary 1996
2 p. 19-20
artikel
26 Access Control Systems for Personal Computers Opaska, Walter P.
1986
2 p. 6-8
artikel
27 A Methodology for Case, Security, and Control Braithwaite, Timothy
1990
2 p. 1-12
artikel
28 An Executive's Guide to the Year 2000: What You Need to Know about Your Computer Systems and How to Ensure That They Survive Parker, Robert
1999
2 p. 15
artikel
29 An IS Audit Work Program on the Software Product Testing Process Menkus, Belden
2001
2 p. 1-8
artikel
30 A Survey of Library System Packages Adams, Donald L.
1973
2 p. 4-8
artikel
31 Auditing Data Communication Networks Winters, Chester M.
1982
2 p. 1-9
artikel
32 Auditing the Microsoft Exchange Electronic Mail System Bigler, Mark
1998
2 p. 1-8
artikel
33 Auditing The Small Office it Infrastructure Miller, Lee
2002
2 p. 12-18
artikel
34 Audit Review of Program Code-I Adams, Donald L.
1975
2 p. 1-5
artikel
35 Audit Review of Program Code-II Weiss, Harold
1975
2 p. 6-7
artikel
36 Audit Software Package Evaluation Knowlton, Roger A.
1976
2 p. 1-4
artikel
37 Book Review 1986
2 p. 16-17
artikel
38 Book Review 1978
2 p. 9-10
artikel
39 Book Review 1983
2 p. 14-15
artikel
40 Book Review 1987
2 p. 14-17
artikel
41 Book Review 1974
2 p. 13-14
artikel
42 Book Review 1976
2 p. 10-12
artikel
43 Book Reviews 1988
2 p. 17-19
artikel
44 Book Reviews 1982
2 p. 15-16
artikel
45 Book Reviews 1984
2 p. 11-14
artikel
46 Book Reviews 1989
2 p. 19-20
artikel
47 Book Reviews 1975
2 p. 10-12
artikel
48 Book Reviews 1985
2 p. 13-17
artikel
49 Book Reviews 1990
2 p. 19-20
artikel
50 Book Reviews 1991
2 p. 16-17
artikel
51 Briefs 1976
2 p. 20
artikel
52 Career Advancement for the EDP Auditor Perry, William E.
1974
2 p. 1-6
artikel
53 Chaos, Subverting Systems, and Privacy Houck, Richard
1986
2 p. 13-16
artikel
54 Clarification & Correction 1975
2 p. 12
artikel
55 Commentary: Discovery Of “Lost” Server Illustrates Problems That Poorly Controlled Drywall Applications Can Create 2001
2 p. 1
artikel
56 Commentary: Remember That Fraud Is Not Something New 2001
2 p. 1
artikel
57 Commentary: Sometimes, There is Nothing that Helps 1999
2 p. 18
artikel
58 Commentary: Understanding The Control Of Backup Magnetic Tapes 2001
2 p. 1
artikel
59 Commentary: why Structured Application Techniques Do Not Work 1999
2 p. 18-19
artikel
60 Computer Crime Legislation 1977
2 p. 4
artikel
61 Computer-Related Grime in Australia FitzGerald, Kevin J.
1984
2 p. 1-8
artikel
62 Computing Problems in San Francisco, Los Angeles, Oakland, and Chicago Menkus, Belden
1992
2 p. 13-16
artikel
63 Conference Calendar 1984
2 p. 7
artikel
64 Controlling the Systems Programmer King, Jonathan
1989
2 p. 1-5
artikel
65 Control of Burroughs Patch Command Saar, Frederick A.
1977
2 p. 7-8
artikel
66 Creating a New Control Environment Padula, Gary
1995
2 p. 9-14
artikel
67 Cumulative Subject Index Volumes Xx-Xxx July 1993-June 2003 2003
2 p. 1-30
artikel
68 Debit Card Policy and Procedure Questionnaire Salzman, Thomas
1996
2 p. 8-18
artikel
69 Developing an Information Assurance Learning Program Based on ACADEMICS Phillips, Timothy
2007
2 p. 1-24
artikel
70 Do Computers Lie? Dunshie, Charles R.
1974
2 p. 7-9
artikel
71 Editorial 1987
2 p. 7
artikel
72 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 13, Number 2 1985
2 p. 1
artikel
73 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 14, Number 2 1986
2 p. 1
artikel
74 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 23, Number 2 1995
2 p. 1
artikel
75 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 24, Number 2 1996
2 p. 1
artikel
76 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 11, Number 2 1983
2 p. 1
artikel
77 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 22, Number 2 1994
2 p. 1
artikel
78 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 2, Number 2 1974
2 p. 1
artikel
79 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 8, Number 2 1980
2 p. 1
artikel
80 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 10, Number 2 1982
2 p. 1
artikel
81 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 12, Number 2 1984
2 p. 1
artikel
82 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 17, Number 2 1989
2 p. 1
artikel
83 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 3, Number 2 1975
2 p. 1
artikel
84 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 5, Number 2 1977
2 p. 1
artikel
85 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 15, Number 2 1987
2 p. 1
artikel
86 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 16, Number 2 1988
2 p. 1
artikel
87 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 18, Number 2 1990
2 p. 1
artikel
88 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 19, Number 2 1991
2 p. 1
artikel
89 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 25, Number 2 1997
2 p. 1
artikel
90 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 7, Number 2 1979
2 p. 1
artikel
91 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 1, Number 2 1973
2 p. 1
artikel
92 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 22, Number 2 1992
2 p. 1
artikel
93 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 21, Number 2 1993
2 p. 1
artikel
94 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 4, Number 2 1976
2 p. 1
artikel
95 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 6, Number 2 1978
2 p. 1
artikel
96 EDPAA Group Visits China Dunmore, Dave
1986
2 p. 8-10
artikel
97 EDP Audit Special Interest Groups 1973
2 p. 15
artikel
98 EDP Risk Analysis for Contingency Planning Fitzgerald, Jerry
1978
2 p. 1-8
artikel
99 Effective Monitoring and Project Management Reporting of Year 2000 Activities Parker, Robert
1999
2 p. 15-16
artikel
100 Employee Internet Use Andrews, Rich
1997
2 p. 11-16
artikel
101 Equity's Auditors Sentenced 1975
2 p. 9
artikel
102 Even EDP Experts ERR 1973
2 p. 15
artikel
103 Executive Guide: Measuring Performance and Demonstrating Results of Information Technology Investments Hoenig, Christopher
1998
2 p. 18
artikel
104 Exploring Security Frontiers 31st Annual Seminar and Exhibits 1985
2 p. 12
artikel
105 Federal Standards Issued 1976
2 p. 9
artikel
106 Feedback on “Futures” Article 1977
2 p. 8-9
artikel
107 Foreign Corrupt Practices Act of 1977 1980
2 p. 6-8
artikel
108 Future Publications 1973
2 p. 15
artikel
109 Gait for Business and Information Technology Risk Marks, Norman
2008
2 p. 7-23
artikel
110 Gmail and Privacy Issues Freeman, Edward H.
2006
2 p. 15-20
artikel
111 Hardware Developments 1975
2 p. 8-9
artikel
112 Has EDP Audit Progressed in the Last 15 Years? Weber, Ron
1987
2 p. 1-6
artikel
113 I'll Take an Order of Data Sensitivity with some Integrity on the Side: Finding A Balance within Access Control Models Ferson, Patricia
2004
2 p. 13-18
artikel
114 Implementing Information Lifecycle Security (ILS) Reed, Bill
2007
2 p. 18-24
artikel
115 Insurance Company use of ACL for Windows Schofield, Edward
1996
2 p. 5-7
artikel
116 Integrating the Planning and Control of Auditing at the Toronto Transit Commission: (Conclusion) Beecroft, Richard
2001
2 p. 1-9
artikel
117 Integrity Considerations in Distributed Systems Patrick, Robert L.
1980
2 p. 1-6
artikel
118 Legal and Recordkeeping Issues that are Associated with the Management of Web Sites Reed, Barbara
2000
2 p. 1-10
artikel
119 Management Support for Edp Auditing Perry, William E.
1976
2 p. 5-9
artikel
120 Managing Enterprise Risk in Today's World of Sophisticated Threats: A Framework for Developing Broad-Based, Cost-Effective Information Security Programs Ross, Ron
2007
2 p. 1-10
artikel
121 Managing the Most Critical Internet Security Vulnerabilities: One Effective Approach Singleton, Tommie
2002
2 p. 1-11
artikel
122 Marketing the Information System Security Program Eakin, David
1995
2 p. 1-9
artikel
123 Measuring the Effectiveness of the EDP Audit Process Perry, William
1988
2 p. 7-12
artikel
124 Microfilm Records 1977
2 p. 5-7
artikel
125 More about Understanding Security and Audit Issues in Electronic Document Interchange Menkus, Belden
1998
2 p. 14-17
artikel
126 New Books 1984
2 p. 10
artikel
127 Of Interest 1985
2 p. 6-12
artikel
128 Of Interest 1989
2 p. 14-17
artikel
129 Of Interest 1996
2 p. 20
artikel
130 Of Interest 1999
2 p. 19-20
artikel
131 Of Interest 2001
2 p. 1-2
artikel
132 Of Interest 1983
2 p. 8-11
artikel
133 Of Interest 1992
2 p. 18-20
artikel
134 Of Interest 1994
2 p. 17-20
artikel
135 Of Interest 1995
2 p. 17-20
artikel
136 Of Interest 1998
2 p. 18-20
artikel
137 Of Interest 2000
2 p. 1-2
artikel
138 Of Interest 1977
2 p. 9-12
artikel
139 Of Interest 1980
2 p. 9-13
artikel
140 Of Interest 1984
2 p. 9-10
artikel
141 Of Interest 1991
2 p. 19-20
artikel
142 Of Interest Schaller, Carol A.
1978
2 p. 20
artikel
143 Of Interest 1986
2 p. 10-13
artikel
144 Of Interest 1987
2 p. 8-13
artikel
145 Of Interest 1988
2 p. 14-17
artikel
146 Of Interest 1990
2 p. 12-16
artikel
147 Of Interest 1997
2 p. 19-20
artikel
148 Of Interest 1979
2 p. 12-16
artikel
149 Of Interest 1982
2 p. 11-12
artikel
150 Of Interest 1993
2 p. 18-20
artikel
151 Practical Guide to Client/Server Computing Ryan, Hugh
1998
2 p. 17-18
artikel
152 Product Information 1982
2 p. 10
artikel
153 Product News 1974
2 p. 10-12
artikel
154 Quis Cusodiet Ipsos Custodes? 2003
2 p. 17-20
artikel
155 RACF Implementation - A Case History Waddill, Samuel P.
1979
2 p. 1-12
artikel
156 Reader Feedback 1982
2 p. 13-15
artikel
157 Reader Feedback 1980
2 p. 13-14
artikel
158 Reader Feedback 1983
2 p. 12-14
artikel
159 Reader Feedback 1987
2 p. 13
artikel
160 Reader Feedback 1978
2 p. 9
artikel
161 Reader Feedback 1979
2 p. 17
artikel
162 Rebuttal 1974
2 p. 9-10
artikel
163 Reviews 1992
2 p. 16
artikel
164 Risk Management Systems: Understanding the Need Levine, Robert
2004
2 p. 1-13
artikel
165 RoboGuards Nab Bads, Track Goods Everett, H. R.
1999
2 p. 16-17
artikel
166 Sarbanes-Oxley Act Requirements Mean Fast Growth for Hotline Service 2004
2 p. 18-20
artikel
167 Sarbanes-Oxley and Enterprise Security: It Governance and What it Takes to Get the Job Done Brown, William
2005
2 p. 1-20
artikel
168 Security and Control Considerations for a Computer Virus-Free Microcomputer Marcella, Albert
1993
2 p. 1-6
artikel
169 Security Publication Available 1973
2 p. 15
artikel
170 Selecting an IT Control Framework Schlarman, Steven
2007
2 p. 11-17
artikel
171 Setting the Stage for Storage Area Networks Burgener, Eric
1999
2 p. 17-18
artikel
172 Seven Habits of Highly Successful Enterprise E-Mail Managers Vandermeer, Jim
2006
2 p. 1-15
artikel
173 Six Common Myths About the Simple Network Management Protocol Kaufman, David
1998
2 p. 8-13
artikel
174 Some Thoughts on the Future of IS Auditing Menkus, Belden
2000
2 p. 1-10
artikel
175 Source and Object Compare Audit Software Dallas, Dennis A.
1983
2 p. 1-7
artikel
176 Support Tool Reviews 1995
2 p. 14-15
artikel
177 Support Tool Reviews 1996
2 p. 18-19
artikel
178 Support Tool Reviews 1994
2 p. 14-15
artikel
179 Support Tool Reviews 1997
2 p. 17-18
artikel
180 Support Tool Reviews 1993
2 p. 15-16
artikel
181 System Intrusions and Law Enforcement Spafford, Eugene
1996
2 p. 1-5
artikel
182 Telecommunication Toll Fraud Liu, Rosina
1997
2 p. 1-10
artikel
183 The Audit of Software Maintenance Pruijm, R. A. M.
1986
2 p. 1-5
artikel
184 The Cost of Poor Testing: A U.S. Government Study (Part 2) Carroll, Charles T.
2003
2 p. 1-16
artikel
185 The CPA Looks to the Past Weiss, Harold
1973
2 p. 1-3
artikel
186 The Latest Security Threat: Open-Book Management Wood, Charles Cresson
1994
2 p. 10-14
artikel
187 The One-Sided Van Contract—The Other EDI Legal Issue Capuder, Lawrence
1993
2 p. 6-14
artikel
188 The Postimplementation Audit Walsh, Robert
1989
2 p. 5-14
artikel
189 The Role of Information Systems Auditing in Systems Development Burns, Tom
1991
2 p. 1-9
artikel
190 The Role of the Auditor in Planning a Successful Information Processing Automation Project Braithwaite, Timothy
1994
2 p. 1-9
artikel
191 The Top 10 Lies Wireless Marketers Tell Rogak, Lisa
2001
2 p. 1-2
artikel
192 The use of Audit Indicator and Integrated Test Facility Techniques 1973
2 p. 8-11
artikel
193 To a Recent Cadmus Education Foundation Session of “Edp Audit and Control” Schaffer, Eleanor O.
1973
2 p. 11-15
artikel
194 Two IBM Security Publications 1985
2 p. 19
artikel
195 Understanding the Unix Operating System Menendez, Doug
1991
2 p. 9-16
artikel
196 Use of a Microcomputer to Assist in Systems-Based Auditing Brodie, Don G.
1985
2 p. 1-6
artikel
197 Using an Expert System to Peel the Computer virus Onion Davis, Russell
1992
2 p. 1-12
artikel
198 Using Regression Analysis as an Analytical is Audit Tool Lanza, Richard
1999
2 p. 1-15
artikel
199 Virtual Private Networks: Turning the Internet into Your Private Network Scott, Charlie
1999
2 p. 16
artikel
200 Visible Ops Security: Achieving Common Security and it Operations Objectives in Four Practical Steps Kim, Gene
2008
2 p. 1-7
artikel
201 11 Ways to a Faster Applications Audit Yarberry, William
1988
2 p. 1-7
artikel
202 “We Tried ITF - We Liked ITF” Munson, James E.
1977
2 p. 1-4
artikel
203 Working with CICS and ACF2 Afmed, Tahir
1988
2 p. 13
artikel
204 Would You Believe $7,500,000?!? Adams, Donald L.
1974
2 p. 6
artikel
                             204 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland