Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             174 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abstacts and Commentaries 1973
7 p. 15-20
artikel
2 Abstracts & Commentaries 1986
7 p. 19-20
artikel
3 Abstracts & Commentaries 1988
7 p. 18-20
artikel
4 Abstracts & Commentaries 1983
7 p. 19-20
artikel
5 Abstracts & Commentaries 1985
7 p. 19-20
artikel
6 Abstracts & Commentaries 1976
7 p. 11-19
artikel
7 Abstracts & Commentaries 1984
7 p. 15-20
artikel
8 Abstracts & Commentaries 1977
7 p. 15-20
artikel
9 Abstracts & Commentaries 1978
7 p. 13-19
artikel
10 Abstracts & Commentaries 1979
7 p. 17-20
artikel
11 Abstracts & Commentaries 1987
7 p. 18-20
artikel
12 Abstracts & Commentaries 1981
7 p. 19-20
artikel
13 Abstracts & Commentaries 1982
7 p. 16-20
artikel
14 Abstracts & Commentaries 1975
7 p. 17-20
artikel
15 Abstracts & Commentary 1991
7 p. 12-17
artikel
16 Abstracts & Commentary 1996
7 p. 18-20
artikel
17 Abstracts & Commentary 1997
7 p. 17-19
artikel
18 Abstracts & Commentary 1990
7 p. 16-19
artikel
19 Abstracts & Commentary 1993
7 p. 15-16
artikel
20 Abstracts & Commentary 1992
7 p. 15-17
artikel
21 Abstracts & Commentary 1994
7 p. 17-18
artikel
22 Abstracts & Commentary 1995
7 p. 18-19
artikel
23 A Case of Catastrophic System Failure Rorer, Stewart
1997
7 p. 11-15
artikel
24 A Framework for Auditing EDP Contingency and Recovery Plans Kuong, Javier F.
1987
7 p. 1-13
artikel
25 An Audit Work Program for Reviewing is Disaster Recovery Plans (Conclusion) Salzman, Thomas
1998
7 p. 8-20
artikel
26 A Security Loophole on IBM Mainframes Opaska, Walter P.
1990
7 p. 8-13
artikel
27 Audit and Control of Supervisor Calls Villegas, Miguel
1992
7 p. 7-14
artikel
28 Audit Concerns in Electronic Data Interchange Carlin, Anna
1990
7 p. 1-8
artikel
29 Auditing DOS/VSE System Software Maintenance Johnson, Thomas W.
1983
7 p. 1-14
artikel
30 Auditing IBM System / 38 Security Nancekivell, Brian D.
1986
7 p. 1-10
artikel
31 Auditing Information Centers Eicher, John
1994
7 p. 1-16
artikel
32 Auditing Project Management of Information Systems Development Doughty, Ken
1996
7 p. 1-14
artikel
33 Audit Workpaper Automation at Boston College Jerskey, Pamela
2000
7 p. 1-8
artikel
34 Backing up a Communications Network: A Case Study Shubella, Thomas
1991
7 p. 1-5
artikel
35 Bank EDP Audit Group Formed Weiss, Harold
1973
7 p. 10-11
artikel
36 Book Review 1988
7 p. 17
artikel
37 Book Review 1983
7 p. 16-18
artikel
38 Book Review 1976
7 p. 8-10
artikel
39 Book Review 1977
7 p. 12-14
artikel
40 Book Review 1978
7 p. 11-12
artikel
41 Book Review 1986
7 p. 18-19
artikel
42 Book Review 1987
7 p. 17-18
artikel
43 Book Review 1979
7 p. 13-16
artikel
44 Book Reviews 1991
7 p. 10-12
artikel
45 Book Reviews 1990
7 p. 19-20
artikel
46 Book Reviews 1973
7 p. 12-14
artikel
47 Books Available 1978
7 p. 12
artikel
48 Commentary: Respected International Computer Security Authority and Valued Edpacs Contributor Will be Missed 1998
7 p. 20
artikel
49 Commentary: The Best Posture Always Is Proactive 2001
7 p. 1
artikel
50 Commentary: Toward A Help Desk Audit Work Program 2001
7 p. 1-2
artikel
51 Commentary: Two Considerations in Applying Single User-Id 2002
7 p. 1
artikel
52 Computer Abuse 1985
7 p. 13-17
artikel
53 Computer Disaster in the United Kingdom Wong, Kenneth K.
1985
7 p. 1-7
artikel
54 Computer Fraud Goes to the DOGS Adams, Donald L.
1978
7 p. 8-9
artikel
55 Contingency and Disaster Planning in EDP Friedman, Stanley D.
1984
7 p. 4-9
artikel
56 Controlling Systems Programming Activities Hardenburg, Kurt L.
1980
7 p. 1-20
artikel
57 Controlling the EDP Auditor Gilhooley, Ian A.
1981
7 p. 1-17
artikel
58 Correction 1979
7 p. 20
artikel
59 Correction 1981
7 p. 17
artikel
60 Database Administration: Functional, Organizational,& Control Perspectives Weber, Ron
1979
7 p. 1-10
artikel
61 Data Processing Crimes De Gouw, Chris
1978
7 p. 1-8
artikel
62 Data Processing Risk Insurance Part II Sleeper, Richard C.
1973
7 p. 7-10
artikel
63 Data Security & Data Processing Abstract, Book Review, & Commentary Adams, Donald L.
1975
7 p. 10-15
artikel
64 Dealing with Data Privacy Protection: An Issue for the 21st Century Grupe, Fritz H.
2003
7 p. 4-19
artikel
65 Digital Identities Can Tame The Wild, Wild Web Master, Adarbad
2005
7 p. 13-23
artikel
66 Editorial Fuqua, Honorable Don
1985
7 p. 12
artikel
67 Editorial Weiss, Harold
1973
7 p. 11
artikel
68 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 13, Number 7 1986
7 p. 1
artikel
69 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 14, Number 7 1987
7 p. 1
artikel
70 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 15, Number 7 1988
7 p. 1
artikel
71 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 18, Number 7 1991
7 p. 1
artikel
72 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 24, Number 7 1997
7 p. 1
artikel
73 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 12, Number 7 1985
7 p. 1
artikel
74 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 1, Number 7 1973
7 p. 1
artikel
75 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 20, Number 7 1993
7 p. 1
artikel
76 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 21, Number 7 1994
7 p. 1
artikel
77 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 23, Number 7 1996
7 p. 1
artikel
78 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 6, Number 7 1979
7 p. 1
artikel
79 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 8, Number 7 1981
7 p. 1
artikel
80 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 10, Number 7 1983
7 p. 1
artikel
81 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 11, Number 7 1984
7 p. 1
artikel
82 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 17, Number 7 1990
7 p. 1
artikel
83 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 19, Number 7 1992
7 p. 1
artikel
84 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 2, Number 7 1975
7 p. 1
artikel
85 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 3, Number 7 1976
7 p. 1
artikel
86 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 22, Number 7 1995
7 p. 1
artikel
87 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 4, Number 7 1977
7 p. 1
artikel
88 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 5, Number 7 1978
7 p. 1
artikel
89 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 7, Number 7 1980
7 p. 1
artikel
90 Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 9, Number 7 1982
7 p. 1
artikel
91 Expanding an Existing Information System Audit Work Program Menkus, Belden
1996
7 p. 15-17
artikel
92 Guidelines for Compliance with Sarbanes-Oxley Raval, Vasant
2004
7 p. 14-20
artikel
93 Implementing Malicious Keyboard Manipulation Software in Dos Boef, Anthonie den
1995
7 p. 13-17
artikel
94 Improving the Security of Chinese National Financial Network Zhao, Jianbin
2000
7 p. 1-8
artikel
95 Information Security and Audit Implications of Electronic Money Warigon, Slemo
1999
7 p. 12-15
artikel
96 Insurance Guldentops, Erik
1984
7 p. 1-3
artikel
97 Internal Audit and Corporate Governance: A Program for Information Security Review Audit Pathak, Jagdish
2004
7 p. 1-13
artikel
98 Italian EDP Centers Bombed 1978
7 p. 9
artikel
99 Joseph J. Wasserman 1932-1978 Weiss, Harold
1978
7 p. 20
artikel
100 Keep Competitors Off Your Intellectual Property Colman, Susan
2000
7 p. 1
artikel
101 Love Eternal - A Fraud Case Study Baird, Lindsay L.
1982
7 p. 1-8
artikel
102 Maintaining E-Mail Security and Availability Miller, Chris
2006
7 p. 16-20
artikel
103 Microcomputer Software can Threaten Mainframe Computer Security Boef, Anthonie den
1995
7 p. 1-6
artikel
104 $10.2 Million Theft May Yield Profit for Victim 1979
7 p. 11-12
artikel
105 Network Intrusion Detection: An Analyst's Hand-book Northcutt, Stephen
2000
7 p. 1-2
artikel
106 New Books and Cassettes 1983
7 p. 18
artikel
107 Of Interest 1986
7 p. 16-18
artikel
108 Of Interest 1988
7 p. 9-16
artikel
109 Of Interest 1990
7 p. 13-16
artikel
110 Of Interest 1996
7 p. 20
artikel
111 Of Interest 1997
7 p. 19-20
artikel
112 Of Interest 1984
7 p. 10-14
artikel
113 Of Interest 2001
7 p. 1-2
artikel
114 Of Interest 1977
7 p. 10-11
artikel
115 Of Interest 1993
7 p. 17-20
artikel
116 Of Interest 1987
7 p. 13-15
artikel
117 Of Interest 1991
7 p. 17-20
artikel
118 Of Interest 1982
7 p. 12-14
artikel
119 Of Interest 1983
7 p. 14-15
artikel
120 Of Interest 1992
7 p. 18-20
artikel
121 Of Interest 1994
7 p. 19-20
artikel
122 Of Interest 1995
7 p. 20
artikel
123 Of Interest 1999
7 p. 19-20
artikel
124 Product Announcement 1976
7 p. 10-11
artikel
125 Reader Feedback 1983
7 p. 15-16
artikel
126 Reader Feedback Vieira, Jose L.
1984
7 p. 15
artikel
127 Reader Feedback 1978
7 p. 10
artikel
128 Reader Feedback 1985
7 p. 17-18
artikel
129 Reader Feedback 1987
7 p. 16
artikel
130 Reader Feedback 1979
7 p. 12
artikel
131 Reader Feedback 1981
7 p. 18
artikel
132 Reader Feedback 1975
7 p. 16
artikel
133 Reader Feedback Gallant, Albert B.
1977
7 p. 12
artikel
134 Reader Feedback 1982
7 p. 15
artikel
135 Sad Experiences Because of an Earthquake Folch, George
1986
7 p. 11-15
artikel
136 Sb1386: One Year Later Tinseth, Andrew
2005
7 p. 1-13
artikel
137 Security Guidance for VAX/VMS Systems Banning, Debra
1993
7 p. 1-11
artikel
138 Security Issues in VTAM Session Managers Goldis, Peter D.
1991
7 p. 5-10
artikel
139 Selecting the “RIGHT” Micro Beitman, Lawrence
1985
7 p. 8-12
artikel
140 Sensitive or Critical Data Access Controls Krehnke, David
2006
7 p. 1-16
artikel
141 Spyware Infiltration Rises in Corporate Networks, But Webroot Survey Finds Companies Still Neglect Threat 2005
7 p. 24
artikel
142 Support Tool Reviews 1992
7 p. 14-15
artikel
143 Support Tool Reviews 1993
7 p. 14-15
artikel
144 Support Tool Reviews 1994
7 p. 17
artikel
145 Support Tool Reviews 1995
7 p. 17-18
artikel
146 Support Tool Reviews 1996
7 p. 17-18
artikel
147 Support Tool Reviews 1997
7 p. 15-17
artikel
148 Test Management of a Year-2000 Conversion Project Braithwaite, Timothy
1997
7 p. 1-11
artikel
149 The Computer as a Lover 1976
7 p. 20
artikel
150 The EDP Quality Assurance Function Perry, William E.
1977
7 p. 1-10
artikel
151 The Euro Poses an Unheralded Challenge to Information Technology and Control Pomeranz, Felix
1999
7 p. 5-12
artikel
152 The Evaluation of Software Packages Doughty, Ken
1988
7 p. 5-9
artikel
153 The Impact of Prototyping on the EDP Auditor Kuong, Javier F.
1988
7 p. 1-5
artikel
154 The Looting of the Baptist Foundation of Arizona Menkus, Belden
2001
7 p. 1-9
artikel
155 The Macro Virus Plague Nachenberg, Carey
1998
7 p. 1-8
artikel
156 The Nature of a Patent 2000
7 p. 1-2
artikel
157 The Nature of a Trademark 2000
7 p. 1
artikel
158 The Real Cost of Losing a Laptop Microcomputer Grawrock, David
1999
7 p. 1-5
artikel
159 The Software Piracy Problem: When the Letter from the Software Publishers Association Arrived Bologna, G. J.
1995
7 p. 7-13
artikel
160 Tracing Modifications to OS Load Modules Sobol, Michael I.
1982
7 p. 8-12
artikel
161 Try ITF, You'll like ITF Perry, William E.
1973
7 p. 1-6
artikel
162 Two Important Data Encryption Structures Reported Broken in Record Times Menkus, Belden
1999
7 p. 15-18
artikel
163 Understanding and Auditing Procurement Card Systems Salzman, Thomas
2002
7 p. 1-13
artikel
164 Understanding and Auditing Service Level Agreements Menkus, Belden
2002
7 p. 1-7
artikel
165 Understanding and Performing Reviews of SDLC Project Software Products Cooke, Richard
2001
7 p. 1-9
artikel
166 Understanding the Information Security Administration Function Higgins, Leta Fee
1992
7 p. 1-7
artikel
167 Using a Firewall Product to Improve the security of a World Wide Web Server Menkus, Belden
2000
7 p. 1-4
artikel
168 Using SMF as an Audit Tool-Accounting Information Perry, William E.
1975
7 p. 1-9
artikel
169 Using SMF as an Audit Tool-Security Perry, William E.
1976
7 p. 1-8
artikel
170 Virtual Private Network Performance Knapp, Laura
2001
7 p. 1
artikel
171 What about the is Steering Committee? Menkus, Belden
1993
7 p. 11-13
artikel
172 When Bad Things Happen to Good Ideas: Knowledge Management Is a Solid Concept that Fell in with the Wrong Company: Software Companies, to be Precise Berkman, Eric
2002
7 p. 1-2
artikel
173 When Getting the Audit Done is the Only Thing Finlay, George
2003
7 p. 1-3
artikel
174 White-Collar Crime Reporting Hotline 1981
7 p. 17
artikel
                             174 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland