default search action
Information Management & Computer Security, Volume 6
Volume 6, Number 1, 1998
- R. K. R. P. Puthli:
METANET: a five-year Internet strategy. 3-14 - H. Joseph Wen:
From client/server to intranet. 15-20 - Carrie Liddy, Alice Sturgeon:
Seamless secured transactions. 21-27 - Gregory Morwood:
Business continuity: awareness and training programmes. 28-32 - Pauline Ratnasingham:
Internet-based EDI trust and security. 33-39
Volume 6, Number 2, 1998
- Han T. M. van der Zee:
Rejuvenating the IT supply organization. 55-65 - H. Joseph Wen:
Internet computer virus protection policy. 66-71 - Lynette Barnard, Rossouw von Solms:
The evaluation and certification of information security against BS 7799. 72-77 - David Thompson:
1997 computer crime and security survey. 78-101
Volume 6, Number 3, 1998
- Ernest-Jan Mutsaers, Han T. M. van der Zee, Henrik Giertz:
The evolution of information technology. 115-126 - Thornton May:
Strategic ignorance: the new competitive high ground. 127-128 - Kent D. Larson:
The role of service level agreements in IT service delivery. 128-132 - Bruce Schneier:
Security pitfalls in cryptographic design. 133-137 - Donald R. Moscato:
Database gateway processor risk analysis using fuzzy logic. 138-144
Volume 6, Number 4, 1998
- Fritz H. Grupe, James M. Hensley, Jeanne H. Yamamura:
Watching systems in action: security at the periphery. 155-159 - Margaret A. Hurley:
Features and functions overload. 160-161 - Pauline Ratnasingham:
Trust in Web-based electronic commerce security. 162-166 - M. E. Thomson, Rossouw von Solms:
Information security awareness: educating your users effectively. 167-173 - Rossouw von Solms:
Information security management (1): why information security is so important. 174-177 - H. Joseph Wen, Jyh-Horng Michael Tarn:
Internet security: a case study of firewall selection. 178-184
Volume 6, Number 5, 1998
- Susan Cramm, Thornton May:
Accelerating executive development: hey coach ... 196-198 - Douglas Brockway, Margaret A. Hurley:
Achieving IT success. 199-204 - Victor Portougal, Lech J. Janczewski:
Industrial information-weight security models. 205-211 - Les Labuschagne, Jan H. P. Eloff:
Real-time risk analysis using Java concepts. 212-217 - Stephen Wilson:
Some limitations of web of trust models. 218-220 - Rossouw von Solms:
Information security management (2): guidelines to the management of information technology security (GMITS). 221-223 - Rossouw von Solms:
Information security management (3): the Code of Practice for Information Security Management (BS 7799). 224-225
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.