default search action
Computers & Security, Volume 1
Volume 1, Number 1, January 1982
- Harold Joseph Highland:
Editorial. 1-2 - Samantha Fordyce:
Computer security: A current assessment. 9-16 - William E. Perry:
Developing a computer security and control strategy. 17-26 - Louis C. Guillou, Bernard Lorig:
Cryptography and teleinformatics. 27-33 - Stanley Friedman:
Contingency and disaster planning. 34-40 - Jay BloomBecker:
International computer crime: Where terrorism and transborder data flow meet. 41-53 - Sigmund N. Porter:
A password extension for improved human factors. 54-56 - Stanley A. Kurzban:
A selective, briefly annotated bibliography of works on data security and privacy. 57-64 - Charles Cresson Wood:
Future applications of cryptography. 65-71 - Michael Willett:
A tutorial on public key cryptography. 72-79 - Paul S. Henry:
Fast decryption algorithm for the knapsack cipher. 80-83
Volume 1, Number 2, June 1982
- Harold Joseph Highland:
Editorial. 95 - Robert H. Courtney Jr.:
A systematic approach to data security. 99-112 - Rolf Blom, Jan-Olof Brüer, Viiveke Fåk, S. Ingvar Åkersten:
On security measures in distributed computer systems. 113-122 - John M. Carroll:
The control of computer-based fraud. 123-138 - Charles Cresson Wood:
Policies for deterring computer abuse. 139-145 - Rolf Moulton:
A multidisciplinary approach to the investigation of computer abuse incidents. 146-151 - William Neugent:
Teaching computer security: A course outline. 152-163 - Esther Harris Highland, Harold Joseph Highland:
A guide to NBS computer security literature. 164-176 - Michael Willett:
Cryptography old and new. 177-186 - Harold Joseph Highland:
Managing information security: A program for the electronic information age : James A. Schweitzer Boston: Butterworth (Publishers), Inc., 1982. vi + 133 pp. $15.95. 191 - Harold Joseph Highland:
Management guide to computer security : J.R. Talbot New York: John Wiley & Sons, 1981. xi + 180 pp. $29.95. 191-192 - Esther H. Highland:
System security standard for electronic data processing : Rolf Moulton New York: The city of New York, 1981. $7.50. 192
Volume 1, Number 3, November 1982
- William Hugh Murray:
Security procedures for program libraries. 201-209 - James K. Shaw, Stuart W. Katzke:
An executive guide to ADP contingency planning. 210-215 - Leslie D. Ball, Gail Dentch, Mary Emerson, Martha Lewis, Susan McWhorter, Frank Turgeon:
Disaster recovery services. 216-225 - Christer Lindén, Hans Block:
Sealing electronic money in Sweden. 226-230 - Susan K. Reed, Dennis K. Branstad:
Reflections on ten years of computer security. 231-232 - Harold Joseph Highland:
Editor's note. 242 - Michael Willett:
Guest editorial. 243-244 - David Kahn:
The grand lines of cryptology's development. 245-248 - R. Creighton Buck:
The public cryptography study group. 249-254 - Dennis K. Branstad, Miles E. Smid:
Integrity and security standards based on cryptography. 255-260 - Subodh K. Banerjee:
High speed implementation of DES. 261-267 - Brian P. Schanning:
Applying public key distribution to local area networks. 268-274 - Nikil S. Jayant:
Analog scramblers for speech privacy. 275-289 - Management guide to computer security : J.P. Talbot: New York: John Wiley and Sons, 1981. xi + 180 pp. $29.95. 290-291
- Multi-national computer systems: An introduction to transnational data flow and data regulation : Harry S. Katzan, Jr.: New York: Van Nostrand Reinhold Co., 1980. xii + 198 pp. $16.95. 291-292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.