default search action
Computers & Security, Volume 2
Volume 2, Number 1, January 1983
- Harold Joseph Highland:
Editorial. 1-2 - Charles Cresson Wood:
Effective information system security with password controls. 5-10 - Belden Menkus:
Notes on terrorism and data processing. 11-15 - William Hugh Murray:
Computer security: Observations on the state of the technology. 16-23 - John M. Carroll, Oi-Lun Wu:
Methodology for security analysis of data-processing systems. 24-34 - Nigel Backwith:
Unique approach to security evaluation. 35-40 - Fred W. Weingarten:
Controlling cryptographic publication. 41-48 - U. Bussolati, Giancarlo Martella:
Towards a new approach to secure database design. 49-62 - Bruce Goldstein:
Computer crime and its prevention. 63-66 - Michael J. Cerullo:
Data communications controls. 67-72 - Carl Steve Guynes:
EFTS impact on computer security. 73-77 - David R. Callaghan:
Securing the distributed word processing network. 78-81
- Harold Joseph Highland:
The hut six story: Breaking the Enigma codes : Gordon Welchman: London: Allen Lane (Penguin Books, Ltd) and New York: McGraw Hill Book Co., Inc., 1982. x + 326 pp., $12.95. 82-83 - Harold Joseph Highland:
CBEMA privacy and security bibliography (October 1982) : Rein Turn, editor: Washington DC: Computer and Business Equipment Manufacturers Association, 1982, iii + 51 pp. 83 - Harold Joseph Highland:
Codes, ciphers and computers: An introduction to information security : Bruce Bosworth: Rochelle Park NJ: Hayden Book Company, Inc., 1982. viii + 259 pp., $13.95. 83-84 - Harold Joseph Highland:
Tutorial: The security of data in networks : Donald W. Davies: Silver Spring MD: IEEE Computer Society, 1981. vi + 241 pp., $20.00 to non-members and $15.00 to members of IEEE. 84 - Harold Joseph Highland:
Advances in computer system security : Rein Turn, editor: Dedham MA: ARTECH HOUSE, Inc., 1981. vi + 403 pp. (Q.E.D. Information Sciences, PO Box 181, Wellesley, MA 02181, USA) $29.50. 84
Volume 2, Number 2, June 1983
- William A. J. Bound, Dennis R. Ruth:
Making risk analysis a useful management tool with microcomputer electronic worksheet packages. 102-115 - Kristian Beckman:
IFIP's first security congress : The multi-million step. 117-119 - Andrew D. Warren:
Evaluating the risks of computer fraud and error. 132-143 - Ronald Paans, Guus Bonnes:
Surreptitious security violation in the MVS operating system. 144-152 - David A. Bonyun:
The use of architectural principles in the design of certifiably secure systems. 153-162 - Per L. Hoving:
To install an Access Control System, activities and checklists. 163-170 - Harold Joseph Highland:
Impact of microcomputers on total computer security. 171-183 - Esther H. Highland:
Computer Security Techniques: List of controls by cost. 189-193
Volume 2, Number 3, November 1983
- Harold Joseph Highland:
Editorial. 213 - Jerome Lobel:
The state-of-the-art in computer security. 218-222 - Charles Cresson Wood:
Enhancing information security with the information resource management approach. 223-229 - John M. Carroll:
Decision support for risk analysis. 230-236 - Brian G. P. Fry, William F. Main:
A conceptual methodology for evaluating security requirements for data assets. 237-241 - Harvey S. Koch:
Implementing an integrated test facility audit using differential files. 242-247 - H. Rex Hartson:
Teaching protection in computing: A research-oriented graduate course. 248-255 - Jan H. P. Eloff:
Selection process for security packages. 256-260 - F. Ayoub:
The design of complete encryption networks using cryptographically equivalent permutations. 261-267 - Arthur Sorkin:
Requirements for a secure terminal switch. 268-274 - Norman R. Bottom Jr.:
An informational theory of security. 275-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.