nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstacts and Commentaries
|
|
|
1973 |
|
7 |
p. 15-20 |
artikel |
2 |
Abstracts & Commentaries
|
|
|
1986 |
|
7 |
p. 19-20 |
artikel |
3 |
Abstracts & Commentaries
|
|
|
1988 |
|
7 |
p. 18-20 |
artikel |
4 |
Abstracts & Commentaries
|
|
|
1983 |
|
7 |
p. 19-20 |
artikel |
5 |
Abstracts & Commentaries
|
|
|
1985 |
|
7 |
p. 19-20 |
artikel |
6 |
Abstracts & Commentaries
|
|
|
1976 |
|
7 |
p. 11-19 |
artikel |
7 |
Abstracts & Commentaries
|
|
|
1984 |
|
7 |
p. 15-20 |
artikel |
8 |
Abstracts & Commentaries
|
|
|
1977 |
|
7 |
p. 15-20 |
artikel |
9 |
Abstracts & Commentaries
|
|
|
1978 |
|
7 |
p. 13-19 |
artikel |
10 |
Abstracts & Commentaries
|
|
|
1979 |
|
7 |
p. 17-20 |
artikel |
11 |
Abstracts & Commentaries
|
|
|
1987 |
|
7 |
p. 18-20 |
artikel |
12 |
Abstracts & Commentaries
|
|
|
1981 |
|
7 |
p. 19-20 |
artikel |
13 |
Abstracts & Commentaries
|
|
|
1982 |
|
7 |
p. 16-20 |
artikel |
14 |
Abstracts & Commentaries
|
|
|
1975 |
|
7 |
p. 17-20 |
artikel |
15 |
Abstracts & Commentary
|
|
|
1991 |
|
7 |
p. 12-17 |
artikel |
16 |
Abstracts & Commentary
|
|
|
1996 |
|
7 |
p. 18-20 |
artikel |
17 |
Abstracts & Commentary
|
|
|
1997 |
|
7 |
p. 17-19 |
artikel |
18 |
Abstracts & Commentary
|
|
|
1990 |
|
7 |
p. 16-19 |
artikel |
19 |
Abstracts & Commentary
|
|
|
1993 |
|
7 |
p. 15-16 |
artikel |
20 |
Abstracts & Commentary
|
|
|
1992 |
|
7 |
p. 15-17 |
artikel |
21 |
Abstracts & Commentary
|
|
|
1994 |
|
7 |
p. 17-18 |
artikel |
22 |
Abstracts & Commentary
|
|
|
1995 |
|
7 |
p. 18-19 |
artikel |
23 |
A Case of Catastrophic System Failure
|
Rorer, Stewart |
|
1997 |
|
7 |
p. 11-15 |
artikel |
24 |
A Framework for Auditing EDP Contingency and Recovery Plans
|
Kuong, Javier F. |
|
1987 |
|
7 |
p. 1-13 |
artikel |
25 |
An Audit Work Program for Reviewing is Disaster Recovery Plans (Conclusion)
|
Salzman, Thomas |
|
1998 |
|
7 |
p. 8-20 |
artikel |
26 |
A Security Loophole on IBM Mainframes
|
Opaska, Walter P. |
|
1990 |
|
7 |
p. 8-13 |
artikel |
27 |
Audit and Control of Supervisor Calls
|
Villegas, Miguel |
|
1992 |
|
7 |
p. 7-14 |
artikel |
28 |
Audit Concerns in Electronic Data Interchange
|
Carlin, Anna |
|
1990 |
|
7 |
p. 1-8 |
artikel |
29 |
Auditing DOS/VSE System Software Maintenance
|
Johnson, Thomas W. |
|
1983 |
|
7 |
p. 1-14 |
artikel |
30 |
Auditing IBM System / 38 Security
|
Nancekivell, Brian D. |
|
1986 |
|
7 |
p. 1-10 |
artikel |
31 |
Auditing Information Centers
|
Eicher, John |
|
1994 |
|
7 |
p. 1-16 |
artikel |
32 |
Auditing Project Management of Information Systems Development
|
Doughty, Ken |
|
1996 |
|
7 |
p. 1-14 |
artikel |
33 |
Audit Workpaper Automation at Boston College
|
Jerskey, Pamela |
|
2000 |
|
7 |
p. 1-8 |
artikel |
34 |
Backing up a Communications Network: A Case Study
|
Shubella, Thomas |
|
1991 |
|
7 |
p. 1-5 |
artikel |
35 |
Bank EDP Audit Group Formed
|
Weiss, Harold |
|
1973 |
|
7 |
p. 10-11 |
artikel |
36 |
Book Review
|
|
|
1988 |
|
7 |
p. 17 |
artikel |
37 |
Book Review
|
|
|
1983 |
|
7 |
p. 16-18 |
artikel |
38 |
Book Review
|
|
|
1976 |
|
7 |
p. 8-10 |
artikel |
39 |
Book Review
|
|
|
1977 |
|
7 |
p. 12-14 |
artikel |
40 |
Book Review
|
|
|
1978 |
|
7 |
p. 11-12 |
artikel |
41 |
Book Review
|
|
|
1986 |
|
7 |
p. 18-19 |
artikel |
42 |
Book Review
|
|
|
1987 |
|
7 |
p. 17-18 |
artikel |
43 |
Book Review
|
|
|
1979 |
|
7 |
p. 13-16 |
artikel |
44 |
Book Reviews
|
|
|
1991 |
|
7 |
p. 10-12 |
artikel |
45 |
Book Reviews
|
|
|
1990 |
|
7 |
p. 19-20 |
artikel |
46 |
Book Reviews
|
|
|
1973 |
|
7 |
p. 12-14 |
artikel |
47 |
Books Available
|
|
|
1978 |
|
7 |
p. 12 |
artikel |
48 |
Commentary: Respected International Computer Security Authority and Valued Edpacs Contributor Will be Missed
|
|
|
1998 |
|
7 |
p. 20 |
artikel |
49 |
Commentary: The Best Posture Always Is Proactive
|
|
|
2001 |
|
7 |
p. 1 |
artikel |
50 |
Commentary: Toward A Help Desk Audit Work Program
|
|
|
2001 |
|
7 |
p. 1-2 |
artikel |
51 |
Commentary: Two Considerations in Applying Single User-Id
|
|
|
2002 |
|
7 |
p. 1 |
artikel |
52 |
Computer Abuse
|
|
|
1985 |
|
7 |
p. 13-17 |
artikel |
53 |
Computer Disaster in the United Kingdom
|
Wong, Kenneth K. |
|
1985 |
|
7 |
p. 1-7 |
artikel |
54 |
Computer Fraud Goes to the DOGS
|
Adams, Donald L. |
|
1978 |
|
7 |
p. 8-9 |
artikel |
55 |
Contingency and Disaster Planning in EDP
|
Friedman, Stanley D. |
|
1984 |
|
7 |
p. 4-9 |
artikel |
56 |
Controlling Systems Programming Activities
|
Hardenburg, Kurt L. |
|
1980 |
|
7 |
p. 1-20 |
artikel |
57 |
Controlling the EDP Auditor
|
Gilhooley, Ian A. |
|
1981 |
|
7 |
p. 1-17 |
artikel |
58 |
Correction
|
|
|
1979 |
|
7 |
p. 20 |
artikel |
59 |
Correction
|
|
|
1981 |
|
7 |
p. 17 |
artikel |
60 |
Database Administration: Functional, Organizational,& Control Perspectives
|
Weber, Ron |
|
1979 |
|
7 |
p. 1-10 |
artikel |
61 |
Data Processing Crimes
|
De Gouw, Chris |
|
1978 |
|
7 |
p. 1-8 |
artikel |
62 |
Data Processing Risk Insurance Part II
|
Sleeper, Richard C. |
|
1973 |
|
7 |
p. 7-10 |
artikel |
63 |
Data Security & Data Processing Abstract, Book Review, & Commentary
|
Adams, Donald L. |
|
1975 |
|
7 |
p. 10-15 |
artikel |
64 |
Dealing with Data Privacy Protection: An Issue for the 21st Century
|
Grupe, Fritz H. |
|
2003 |
|
7 |
p. 4-19 |
artikel |
65 |
Digital Identities Can Tame The Wild, Wild Web
|
Master, Adarbad |
|
2005 |
|
7 |
p. 13-23 |
artikel |
66 |
Editorial
|
Fuqua, Honorable Don |
|
1985 |
|
7 |
p. 12 |
artikel |
67 |
Editorial
|
Weiss, Harold |
|
1973 |
|
7 |
p. 11 |
artikel |
68 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 13, Number 7
|
|
|
1986 |
|
7 |
p. 1 |
artikel |
69 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 14, Number 7
|
|
|
1987 |
|
7 |
p. 1 |
artikel |
70 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 15, Number 7
|
|
|
1988 |
|
7 |
p. 1 |
artikel |
71 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 18, Number 7
|
|
|
1991 |
|
7 |
p. 1 |
artikel |
72 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 24, Number 7
|
|
|
1997 |
|
7 |
p. 1 |
artikel |
73 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 12, Number 7
|
|
|
1985 |
|
7 |
p. 1 |
artikel |
74 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 1, Number 7
|
|
|
1973 |
|
7 |
p. 1 |
artikel |
75 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 20, Number 7
|
|
|
1993 |
|
7 |
p. 1 |
artikel |
76 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 21, Number 7
|
|
|
1994 |
|
7 |
p. 1 |
artikel |
77 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 23, Number 7
|
|
|
1996 |
|
7 |
p. 1 |
artikel |
78 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 6, Number 7
|
|
|
1979 |
|
7 |
p. 1 |
artikel |
79 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 8, Number 7
|
|
|
1981 |
|
7 |
p. 1 |
artikel |
80 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 10, Number 7
|
|
|
1983 |
|
7 |
p. 1 |
artikel |
81 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 11, Number 7
|
|
|
1984 |
|
7 |
p. 1 |
artikel |
82 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 17, Number 7
|
|
|
1990 |
|
7 |
p. 1 |
artikel |
83 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 19, Number 7
|
|
|
1992 |
|
7 |
p. 1 |
artikel |
84 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 2, Number 7
|
|
|
1975 |
|
7 |
p. 1 |
artikel |
85 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 3, Number 7
|
|
|
1976 |
|
7 |
p. 1 |
artikel |
86 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 22, Number 7
|
|
|
1995 |
|
7 |
p. 1 |
artikel |
87 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 4, Number 7
|
|
|
1977 |
|
7 |
p. 1 |
artikel |
88 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 5, Number 7
|
|
|
1978 |
|
7 |
p. 1 |
artikel |
89 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 7, Number 7
|
|
|
1980 |
|
7 |
p. 1 |
artikel |
90 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 9, Number 7
|
|
|
1982 |
|
7 |
p. 1 |
artikel |
91 |
Expanding an Existing Information System Audit Work Program
|
Menkus, Belden |
|
1996 |
|
7 |
p. 15-17 |
artikel |
92 |
Guidelines for Compliance with Sarbanes-Oxley
|
Raval, Vasant |
|
2004 |
|
7 |
p. 14-20 |
artikel |
93 |
Implementing Malicious Keyboard Manipulation Software in Dos
|
Boef, Anthonie den |
|
1995 |
|
7 |
p. 13-17 |
artikel |
94 |
Improving the Security of Chinese National Financial Network
|
Zhao, Jianbin |
|
2000 |
|
7 |
p. 1-8 |
artikel |
95 |
Information Security and Audit Implications of Electronic Money
|
Warigon, Slemo |
|
1999 |
|
7 |
p. 12-15 |
artikel |
96 |
Insurance
|
Guldentops, Erik |
|
1984 |
|
7 |
p. 1-3 |
artikel |
97 |
Internal Audit and Corporate Governance: A Program for Information Security Review Audit
|
Pathak, Jagdish |
|
2004 |
|
7 |
p. 1-13 |
artikel |
98 |
Italian EDP Centers Bombed
|
|
|
1978 |
|
7 |
p. 9 |
artikel |
99 |
Joseph J. Wasserman 1932-1978
|
Weiss, Harold |
|
1978 |
|
7 |
p. 20 |
artikel |
100 |
Keep Competitors Off Your Intellectual Property
|
Colman, Susan |
|
2000 |
|
7 |
p. 1 |
artikel |
101 |
Love Eternal - A Fraud Case Study
|
Baird, Lindsay L. |
|
1982 |
|
7 |
p. 1-8 |
artikel |
102 |
Maintaining E-Mail Security and Availability
|
Miller, Chris |
|
2006 |
|
7 |
p. 16-20 |
artikel |
103 |
Microcomputer Software can Threaten Mainframe Computer Security
|
Boef, Anthonie den |
|
1995 |
|
7 |
p. 1-6 |
artikel |
104 |
$10.2 Million Theft May Yield Profit for Victim
|
|
|
1979 |
|
7 |
p. 11-12 |
artikel |
105 |
Network Intrusion Detection: An Analyst's Hand-book
|
Northcutt, Stephen |
|
2000 |
|
7 |
p. 1-2 |
artikel |
106 |
New Books and Cassettes
|
|
|
1983 |
|
7 |
p. 18 |
artikel |
107 |
Of Interest
|
|
|
1986 |
|
7 |
p. 16-18 |
artikel |
108 |
Of Interest
|
|
|
1988 |
|
7 |
p. 9-16 |
artikel |
109 |
Of Interest
|
|
|
1990 |
|
7 |
p. 13-16 |
artikel |
110 |
Of Interest
|
|
|
1996 |
|
7 |
p. 20 |
artikel |
111 |
Of Interest
|
|
|
1997 |
|
7 |
p. 19-20 |
artikel |
112 |
Of Interest
|
|
|
1984 |
|
7 |
p. 10-14 |
artikel |
113 |
Of Interest
|
|
|
2001 |
|
7 |
p. 1-2 |
artikel |
114 |
Of Interest
|
|
|
1977 |
|
7 |
p. 10-11 |
artikel |
115 |
Of Interest
|
|
|
1993 |
|
7 |
p. 17-20 |
artikel |
116 |
Of Interest
|
|
|
1987 |
|
7 |
p. 13-15 |
artikel |
117 |
Of Interest
|
|
|
1991 |
|
7 |
p. 17-20 |
artikel |
118 |
Of Interest
|
|
|
1982 |
|
7 |
p. 12-14 |
artikel |
119 |
Of Interest
|
|
|
1983 |
|
7 |
p. 14-15 |
artikel |
120 |
Of Interest
|
|
|
1992 |
|
7 |
p. 18-20 |
artikel |
121 |
Of Interest
|
|
|
1994 |
|
7 |
p. 19-20 |
artikel |
122 |
Of Interest
|
|
|
1995 |
|
7 |
p. 20 |
artikel |
123 |
Of Interest
|
|
|
1999 |
|
7 |
p. 19-20 |
artikel |
124 |
Product Announcement
|
|
|
1976 |
|
7 |
p. 10-11 |
artikel |
125 |
Reader Feedback
|
|
|
1983 |
|
7 |
p. 15-16 |
artikel |
126 |
Reader Feedback
|
Vieira, Jose L. |
|
1984 |
|
7 |
p. 15 |
artikel |
127 |
Reader Feedback
|
|
|
1978 |
|
7 |
p. 10 |
artikel |
128 |
Reader Feedback
|
|
|
1985 |
|
7 |
p. 17-18 |
artikel |
129 |
Reader Feedback
|
|
|
1987 |
|
7 |
p. 16 |
artikel |
130 |
Reader Feedback
|
|
|
1979 |
|
7 |
p. 12 |
artikel |
131 |
Reader Feedback
|
|
|
1981 |
|
7 |
p. 18 |
artikel |
132 |
Reader Feedback
|
|
|
1975 |
|
7 |
p. 16 |
artikel |
133 |
Reader Feedback
|
Gallant, Albert B. |
|
1977 |
|
7 |
p. 12 |
artikel |
134 |
Reader Feedback
|
|
|
1982 |
|
7 |
p. 15 |
artikel |
135 |
Sad Experiences Because of an Earthquake
|
Folch, George |
|
1986 |
|
7 |
p. 11-15 |
artikel |
136 |
Sb1386: One Year Later
|
Tinseth, Andrew |
|
2005 |
|
7 |
p. 1-13 |
artikel |
137 |
Security Guidance for VAX/VMS Systems
|
Banning, Debra |
|
1993 |
|
7 |
p. 1-11 |
artikel |
138 |
Security Issues in VTAM Session Managers
|
Goldis, Peter D. |
|
1991 |
|
7 |
p. 5-10 |
artikel |
139 |
Selecting the “RIGHT” Micro
|
Beitman, Lawrence |
|
1985 |
|
7 |
p. 8-12 |
artikel |
140 |
Sensitive or Critical Data Access Controls
|
Krehnke, David |
|
2006 |
|
7 |
p. 1-16 |
artikel |
141 |
Spyware Infiltration Rises in Corporate Networks, But Webroot Survey Finds Companies Still Neglect Threat
|
|
|
2005 |
|
7 |
p. 24 |
artikel |
142 |
Support Tool Reviews
|
|
|
1992 |
|
7 |
p. 14-15 |
artikel |
143 |
Support Tool Reviews
|
|
|
1993 |
|
7 |
p. 14-15 |
artikel |
144 |
Support Tool Reviews
|
|
|
1994 |
|
7 |
p. 17 |
artikel |
145 |
Support Tool Reviews
|
|
|
1995 |
|
7 |
p. 17-18 |
artikel |
146 |
Support Tool Reviews
|
|
|
1996 |
|
7 |
p. 17-18 |
artikel |
147 |
Support Tool Reviews
|
|
|
1997 |
|
7 |
p. 15-17 |
artikel |
148 |
Test Management of a Year-2000 Conversion Project
|
Braithwaite, Timothy |
|
1997 |
|
7 |
p. 1-11 |
artikel |
149 |
The Computer as a Lover
|
|
|
1976 |
|
7 |
p. 20 |
artikel |
150 |
The EDP Quality Assurance Function
|
Perry, William E. |
|
1977 |
|
7 |
p. 1-10 |
artikel |
151 |
The Euro Poses an Unheralded Challenge to Information Technology and Control
|
Pomeranz, Felix |
|
1999 |
|
7 |
p. 5-12 |
artikel |
152 |
The Evaluation of Software Packages
|
Doughty, Ken |
|
1988 |
|
7 |
p. 5-9 |
artikel |
153 |
The Impact of Prototyping on the EDP Auditor
|
Kuong, Javier F. |
|
1988 |
|
7 |
p. 1-5 |
artikel |
154 |
The Looting of the Baptist Foundation of Arizona
|
Menkus, Belden |
|
2001 |
|
7 |
p. 1-9 |
artikel |
155 |
The Macro Virus Plague
|
Nachenberg, Carey |
|
1998 |
|
7 |
p. 1-8 |
artikel |
156 |
The Nature of a Patent
|
|
|
2000 |
|
7 |
p. 1-2 |
artikel |
157 |
The Nature of a Trademark
|
|
|
2000 |
|
7 |
p. 1 |
artikel |
158 |
The Real Cost of Losing a Laptop Microcomputer
|
Grawrock, David |
|
1999 |
|
7 |
p. 1-5 |
artikel |
159 |
The Software Piracy Problem: When the Letter from the Software Publishers Association Arrived
|
Bologna, G. J. |
|
1995 |
|
7 |
p. 7-13 |
artikel |
160 |
Tracing Modifications to OS Load Modules
|
Sobol, Michael I. |
|
1982 |
|
7 |
p. 8-12 |
artikel |
161 |
Try ITF, You'll like ITF
|
Perry, William E. |
|
1973 |
|
7 |
p. 1-6 |
artikel |
162 |
Two Important Data Encryption Structures Reported Broken in Record Times
|
Menkus, Belden |
|
1999 |
|
7 |
p. 15-18 |
artikel |
163 |
Understanding and Auditing Procurement Card Systems
|
Salzman, Thomas |
|
2002 |
|
7 |
p. 1-13 |
artikel |
164 |
Understanding and Auditing Service Level Agreements
|
Menkus, Belden |
|
2002 |
|
7 |
p. 1-7 |
artikel |
165 |
Understanding and Performing Reviews of SDLC Project Software Products
|
Cooke, Richard |
|
2001 |
|
7 |
p. 1-9 |
artikel |
166 |
Understanding the Information Security Administration Function
|
Higgins, Leta Fee |
|
1992 |
|
7 |
p. 1-7 |
artikel |
167 |
Using a Firewall Product to Improve the security of a World Wide Web Server
|
Menkus, Belden |
|
2000 |
|
7 |
p. 1-4 |
artikel |
168 |
Using SMF as an Audit Tool-Accounting Information
|
Perry, William E. |
|
1975 |
|
7 |
p. 1-9 |
artikel |
169 |
Using SMF as an Audit Tool-Security
|
Perry, William E. |
|
1976 |
|
7 |
p. 1-8 |
artikel |
170 |
Virtual Private Network Performance
|
Knapp, Laura |
|
2001 |
|
7 |
p. 1 |
artikel |
171 |
What about the is Steering Committee?
|
Menkus, Belden |
|
1993 |
|
7 |
p. 11-13 |
artikel |
172 |
When Bad Things Happen to Good Ideas: Knowledge Management Is a Solid Concept that Fell in with the Wrong Company: Software Companies, to be Precise
|
Berkman, Eric |
|
2002 |
|
7 |
p. 1-2 |
artikel |
173 |
When Getting the Audit Done is the Only Thing
|
Finlay, George |
|
2003 |
|
7 |
p. 1-3 |
artikel |
174 |
White-Collar Crime Reporting Hotline
|
|
|
1981 |
|
7 |
p. 17 |
artikel |