default search action
Information Systems Security, Volume 1
Volume 1, Number 1, 1992
- Donn B. Parker:
From The Editor. 3
- Harry B. DeMaio:
The Case for Integrating Quality, Security, and Continuity Programs. 5-8
- Fred W. Weingarten:
Cryptography and National Security. 9-12
- Donn B. Parker:
Teaching the Ethical Use of Information Assets. 13-16
- Ralph Spencer Poore:
Ensuring the Timely Destruction of Information. 17-19
- John D. Podesta:
The Dangers of Legislating Controls on Information Technology. 20-22
- Michael I. Sobol:
Callback Security. 23-26
- Robert R. Moeller:
Computer Viruses. 27-30
- Angel L. Rivera:
Micro-Mainframe Security. 31-41 - George E. Biles, David Allen Mann:
Software Law and Its Perils : Copyright, Patent, and the Racketeering Statute. 42-49 - Tobie Finzel:
Trends in Operating System Security. 50-57 - A. Padgett Peterson:
Counteracting Viruses in an MS-DOS Environment. 58-65 - John R. Muir:
ID Verification in Integrated Systems. 66-71
Volume 1, Number 4, 1993
- Donn B. Parker:
From the Editor. 3
- Harry B. DeMaio:
Building Enterprisewide Alliances. 7-11
- Lance J. Hoffman:
Bugging the Digital Network. 12-15
- Donn B. Parker:
Putting Hacker Crime in Perspective. 16-19
- Philip Teplitzky:
The Weak Link in Distributed Data Base Security. 20-23
- Cole Emerson:
Developments in Security and Recovery Certification. 24-27
- Michael I. Sobol:
Disaster Recovery Planning Software. 28-32
- Robert R. Moeller:
Information Security: Basic to Specialized Topics. 33-37
- Teresa F. Lunt:
Automated Instruction Detection. 38-50 - James E. Molini:
Building an Automated Security Monitor. 51-59 - David L. Anderson:
Securing the OS/2 Operating Environment. 60-73 - Hal Tipton:
Certification of Security Practitioners. 75-84
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.