-
2
-
-
85029983794
-
-
Press on Printers, London
-
Audit Commission. Opportunity Makes the Thief. Press on Printers, London, 1994.
-
(1994)
Opportunity Makes the Thief
-
-
-
3
-
-
26144445775
-
Ny teknik/data. Virus blir bara värre
-
Borgström, H. Ny Teknik/Data. Virus blir bara värre. Vecka 17, 1996, p 4.
-
(1996)
Vecka
, vol.17
, pp. 4
-
-
Borgström, H.1
-
5
-
-
0042217156
-
Communications security
-
Caelli, W., Longley, D. & M. Shain. Stockton Press, New York
-
Caelli, William & Alan Tickle. Communications Security: In Caelli, W., Longley, D. & M. Shain. Information Security Handbook, Stockton Press, New York, 1991, pp 649-706.
-
(1991)
Information Security Handbook
, pp. 649-706
-
-
Caelli, W.1
Tickle, A.2
-
7
-
-
0042217155
-
Portrait of the computer criminal
-
Information Security The Next Decade. Ed. J. Eloff & S. von Solms, South Africa 9-12 May
-
Carroll, J.M. Portrait of the Computer Criminal. In Information Security The Next Decade. Ed. J. Eloff & S. von Solms, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, South Africa 9-12 May 1995, pp 533-545.
-
(1995)
Proceedings of the IFIP TC11 Eleventh International Conference on Information Security
, pp. 533-545
-
-
Carroll, J.M.1
-
11
-
-
85029997004
-
Schluss mit abhören
-
Computer Spectrum. Schluss mit Abhören. Nummer 9, 1990.
-
(1990)
Computer Spectrum
, vol.9
-
-
-
12
-
-
85029985355
-
Computer fraud & security bulletin
-
1995: Elsevier Advanced Technology, Oxford, August
-
Computer Weekly. 1995: In Computer Fraud & Security Bulletin, Elsevier Advanced Technology, Oxford, August 1995, p 4.
-
(1995)
Computer Weekly
, pp. 4
-
-
-
13
-
-
85029987277
-
Tallberg, anders. Artikelkompendium
-
Svenska Handelshögskolan, Helsingfors
-
Deborah Russell & G.T. Gangemi. 1991. In: Tallberg, Anders. Artikelkompendium. Datasäkerhet och adb-revision, Svenska Handelshögskolan, Helsingfors, 1994.
-
(1991)
Datasäkerhet och Adb-revision
-
-
Russell, D.1
Gangemi, G.T.2
-
14
-
-
85029978090
-
-
Republic of South Africa
-
Deloitte Touche Tohmatsu International. Information Protection and Client Server, Republic of South Africa, 1995, p 17.
-
(1995)
Information Protection and Client Server
, pp. 17
-
-
-
15
-
-
85029984657
-
-
Republic of South Africa
-
Deloitte Touche Tohmatsu International. Computer Assurance Services, Republic of South Africa, 1995.
-
(1995)
Computer Assurance Services
-
-
-
16
-
-
0042217154
-
Security management and policy
-
Caelli, W. Longley, D., & Shain M. Stockton Press, New York
-
Dorey, Paul. Security Management and Policy: In Caelli, W. Longley, D., & Shain M. Information Security Handbook, Stockton Press, New York, 1991, pp 27-74.
-
(1991)
Information Security Handbook
, pp. 27-74
-
-
Dorey, P.1
-
17
-
-
0042718169
-
Fraud prevention and computer security for financial institutions-part 2
-
Elsevier Advanced Technology, Oxford, March
-
Essinger, James. Fraud Prevention and Computer Security for Financial Institutions-Part 2, Computer Fraud & Security Bulletin, Elsevier Advanced Technology, Oxford, March 1995, pp 16-19.
-
(1995)
Computer Fraud & Security Bulletin
, pp. 16-19
-
-
Essinger, J.1
-
19
-
-
85029992437
-
Information security: Vital for competitive advantages
-
South Africa, Cape Town
-
Finne, Thomas. Information Security: Vital for Competitive Advantages. Paper presented at the IFIP WG 11.1 Workshop. South Africa, Cape Town, 8.5.1995.
-
(1995)
IFIP WG 11.1 Workshop
, vol.8
, Issue.5
-
-
Finne, T.1
-
21
-
-
0042217148
-
-
Finnish Sun user group
-
FISUGbytes. Finnish Sun user group, No.3. 1994.
-
(1994)
FISUGbytes
, vol.3
-
-
-
24
-
-
33744978877
-
Information security issues in mobile computing
-
Information Security The Next Decade. Ed. J. Eloff & S. von Solms. South Africa 9-12 May
-
Hardjono, Thomas & Jennifer Seberry. Information Security Issues in Mobile Computing: In Information Security The Next Decade. Ed. J. Eloff & S. von Solms. Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, South Africa 9-12 May 1995, pp 125-134.
-
(1995)
Proceedings of the IFIP TC11 Eleventh International Conference on Information Security
, pp. 125-134
-
-
Hardjono, T.1
Seberry, J.2
-
27
-
-
0028732047
-
-
Elsevier Advanced Technology, Oxford
-
Highland, Harold. Random Bits and Bytes, Computers & Security, Volume 13, Number 6, Elsevier Advanced Technology, Oxford, 1994, pp 458-465.
-
(1994)
Random Bits and Bytes, Computers & Security
, vol.13
, Issue.6
, pp. 458-465
-
-
Highland, H.1
-
28
-
-
85029980542
-
Encryption policy for the global information infrastructure
-
Information Security The Next Decade. Ed. J. Eloff & S. von Solms. South Africa 9-12 May
-
Hoffman, Lance. Encryption Policy for the Global Information Infrastructure: In Information Security The Next Decade. Ed. J. Eloff & S. von Solms. Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, South Africa 9-12 May 1995, pp 50-63.
-
(1995)
Proceedings of the IFIP TC11 Eleventh International Conference on Information Security
, pp. 50-63
-
-
Hoffman, L.1
-
32
-
-
84884719062
-
-
University of Oulu, Department of Information Processing Science, Working paper, Oulu
-
Kajava, Jorma & Jussipekka Leiwo. Tietoturvahenkilöstö organisaatiossa. University of Oulu, Department of Information Processing Science, Working paper, Oulu, 1994.
-
(1994)
Tietoturvahenkilöstö Organisaatiossa
-
-
Kajava, J.1
Leiwo, J.2
-
35
-
-
0029214744
-
Biometrics, is it a viable proposition for identity authentication and access control?
-
Elsevier Advanced Technology, Oxford
-
Kim, Hyun-Jung. Biometrics, is it a Viable Proposition for Identity Authentication and Access Control? Computers & Security, Volume 14, No. 3, 1995, pp 205-214, Elsevier Advanced Technology, Oxford.
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 205-214
-
-
Kim, H.-J.1
-
37
-
-
0042718176
-
Tietoturvauutiset
-
LAN Vision Oy. Tietoturvauutiset. No. 1, 1995, p 4.
-
(1995)
LAN Vision Oy
, vol.1
, pp. 4
-
-
-
39
-
-
85029972874
-
-
University of Oulu, Department of Information Processing Science, Working paper, Oulu
-
Leiwo, Jussipekka & Jorma Kajava. Erään pienen organisaation tietorikosketjun tarkastelua. University of Oulu, Department of Information Processing Science, Working paper, Oulu, 1994.
-
(1994)
Erään Pienen Organisaation Tietorikosketjun Tarkastelua
-
-
Leiwo, J.1
Kajava, J.2
-
41
-
-
0043219343
-
Access control
-
Caelli, William., Longley, D. & Shain, M. Stockton Press, New York
-
Longley, Dennis. Access Control: In Caelli, William., Longley, D. & Shain, M. Information Security Handbook, Stockton Press, New York, 1991, pp 455-544.
-
(1991)
Information Security Handbook
, pp. 455-544
-
-
Longley, D.1
-
43
-
-
85029987475
-
-
Elsevier Advanced Technology, Oxford, December
-
Maynard, Jeff. Computer Audit Update, Elsevier Advanced Technology, Oxford, December 1994, pp 15-18.
-
(1994)
Computer Audit Update
, pp. 15-18
-
-
Maynard, J.1
-
44
-
-
85030000795
-
Mikrodatorns testredaktion
-
Mikrodatorn. Mikrodatorns testredaktion. Säkra data med billig backup. No.1. 1993, pp 41-42, 47.
-
(1993)
Säkra Data Med Billig Backup
, vol.1
, pp. 41-42
-
-
-
51
-
-
85029999429
-
-
Elsevier Advanced Technology, Oxford, August
-
Ongetta, Silvano. Computer Fraud & Security Bulletin, Elsevier Advanced Technology, Oxford, August 1994, pp 13-15.
-
(1994)
Computer Fraud & Security Bulletin
, pp. 13-15
-
-
Ongetta, S.1
-
52
-
-
85067946532
-
Hitting the wall: Errors in developing and debugging a "simple" spreadsheet model
-
Ed. Jay F. Nunamaker Jr. & Ralph H. Sprague Jr.
-
Panko, Raymond. Hitting the Wall: Errors in Developing and Debugging a "Simple" Spreadsheet Model. In Proceedings of the Twenty-Ninth Annual Hawaii International Conference on System Sciences. Ed. Jay F. Nunamaker Jr. & Ralph H. Sprague Jr. 1996, Vol II, pp 356-363.
-
(1996)
Proceedings of the Twenty-ninth Annual Hawaii International Conference on System Sciences
, vol.2
, pp. 356-363
-
-
Panko, R.1
-
54
-
-
85029987024
-
The mother of all safeguards
-
Elsevier Advanced Technology, Oxford, July
-
Parker, Donn B. The Mother of all Safeguards, Computer Fraud & Security Bulletin, Elsevier Advanced Technology, Oxford, July 1995, pp 10-12.
-
(1995)
Computer Fraud & Security Bulletin
, pp. 10-12
-
-
Parker, D.B.1
-
62
-
-
26144467354
-
-
Seppänen, Janne. Kun verkko kaatuu, kaatuu yrityskin, Tietoviikko, 31.3.1995, p 4.
-
(1995)
Kun Verkko Kaatuu, Kaatuu Yrityskin, Tietoviikko
, vol.31
, Issue.3
, pp. 4
-
-
Seppänen, J.1
-
65
-
-
0029214917
-
Business continuity planning
-
Elsevier Advanced Technology, Oxford
-
Smith, Martin & John Sherwood. Business Continuity Planning, Computers & Security, Volume 14, Number 1, Elsevier Advanced Technology, Oxford, 1995, pp 14-23.
-
(1995)
Computers & Security
, vol.14
, Issue.1
, pp. 14-23
-
-
Smith, M.1
Sherwood, J.2
-
67
-
-
0042217097
-
Security in distributed and client/server systems - A management view
-
Elsevier Advanced Technology, UK
-
Symonds, Ian M. Security in Distributed and Client/Server Systems - a Management View, Computers & Security, Volume 13, No. 6, Elsevier Advanced Technology, UK, 1994, pp 473-480.
-
(1994)
Computers & Security
, vol.13
, Issue.6
, pp. 473-480
-
-
Symonds, I.M.1
-
68
-
-
0041716783
-
-
Lokakuu
-
Uusitupa, Seppo. Tietokone, Tietoturvaa - miksi ja miten, No. 10, Lokakuu, 1989, pp 54-55.
-
(1989)
Tietokone, Tietoturvaa - Miksi ja Miten
, Issue.10
, pp. 54-55
-
-
Uusitupa, S.1
-
69
-
-
0041716718
-
Information security accreditations - The ISO 9000 route
-
Information Security The Next Decade. Ed. J. Eloff & S. von Solms, South Africa 9-12 May
-
Von Solms, Rossouw & L.R. Meyer. Information Security Accreditations - The ISO 9000 Route: In Information Security The Next Decade. Ed. J. Eloff & S. von Solms, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, South Africa 9-12 May 1995, pp 40-49.
-
(1995)
Proceedings of the IFIP TC11 Eleventh International Conference on Information Security
, pp. 40-49
-
-
Von Solms, R.1
Meyer, L.R.2
-
71
-
-
0043219327
-
Information security awareness raising methods
-
Elsevier Advanced Technology, Oxford, June
-
Wood, Charles C. Information Security Awareness Raising Methods, Computer Fraud & Security Bulletin, Elsevier Advanced Technology, Oxford, June 1995, pp 13-15.
-
(1995)
Computer Fraud & Security Bulletin
, pp. 13-15
-
-
Wood, C.C.1
|