![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Information Management & Computer Security, Volume 3
Volume 3, Number 1, 1995
- Martin Whybrow:
Bridging the gaps. 4-6 - Elaine Irwin:
Software Intelligence introduces a new cross-platform, dient/server security solution. 7-8 - T. J. Paradine:
Business interruption insurance: a vital ingredient in your disaster recovery plan. 9-17 - Jay BloomBecker:
Simplifying the state and federal computer crime law maze in the USA. 18-20 - Bruce Edwards, John Cooper:
Testing the disaster recovery plan. 21-27 - John R. Campbell:
Real security for local area networks. 28-29 - Richard Cardinali:
Safeguarding databases: basic concepts revisited. 30-37 - Kevin J. Fitzgerald:
What if you had a flood in your computer room. 38-40 - Graham Collier:
Information privacy. 41-45
Volume 3, Number 2, 1995
- Richard G. Mathieu, Robert L. Woodard:
Data integrity and the Internet: implications for management. 3-7 - Kevin J. Fitzgerald:
Information security baselines. 8-12 - Matthew K. O. Lee
:
Legal control of computer crime in Hong Kong. 13-19 - Phil Spurling:
Promoting security awareness and commitment. 20-26 - Snehamay Banerjee, Damodar Y. Golhar:
Security issues in the EDI environment. 27-33 - Mahmoud M. Yasin, John V. Quigley:
The utility of information systems views of CEOs and information system executives. 34-38
Volume 3, Number 3, 1995
- Catherine Ko, Margaret A. Hurley:
Managing end-user computing. 3-6 - Barry Moule, Lina Giavara:
Policies, procedures and standards: an approach for implementation. 7-16 - Russell Smith:
Business continuity planning and service level agreements. 17-19 - Kevin J. Fitzgerald:
Establishing an effective continuity strategy. 20-24 - Thornton May:
The interpersonal computer interregnum. 25-33
Volume 3, Number 4, 1995
- Gregory R. Doddrell:
Security environment reviews. 3-14 - Gregory R. Doddrell:
Information security and the Internet. 15-19 - Barry Gubbins:
Protecting availability in complex computer environments. 20-22 - Charles Cresson Wood:
The Charles Cresson Wood file. 23-26 - Kevin J. Fitzgerald:
Security and data integrity for LANs and WANs. 27-33
Volume 3, Number 5, 1995
- Richard L. Nolan:
Improving IT quality: the basics to boost service and cut costs. 3-7 - Maaikel Klein Klouwenberg, William J. D. Koo, J. Alphons M. van Schaik:
Establishing business strategy with information technology. 8-20 - Charles Cresson Wood:
Background checks for employees in computer-related positions of trust. 21-22 - Thornton May:
Chief information officer ABCs. 23-24 - David Zerman:
Crisis communication: managing the mass media. 25-28 - David P. Norton:
Managing benefits from information technology. 29-35
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.