default search action
Information Systems Security, Volume 2
Volume 2, Number 1, 1993
- Donn B. Parker:
From the Editor. 3-4
- Harry B. DeMaio:
Reevaluating Information Ownership. 5-8
- Chris McDonald:
Computers at Risk: Does Anyone Remember?. 9-12
- Donn B. Parker:
Confidentiality of Information and Personal Privacy. 13-17
- Ralph Spencer Poore:
Is Network Security a Contradiction in Terms? 18-21
- William List:
Is Error Detection a Security Concern? 22-24
- Michael I. Sobol:
Macintosh Security and Data Integrity Products. 25-29
- Robert R. Moeller:
Network Security. 30-32
- Peter D. Goldis:
MVS Integrity: The Intruder's Point of View. 33-39 - Richard L. Baskerville:
Information Security: Adapting to Survive. 40-47 - Cheryl W. Helsing:
A Customer-Driven Approach to Business Resumption Planning. 48-56 - Ravi S. Sandhu, Sushil Jajodia:
Limitations of Relational Data Base Access Controls. 57-72
Volume 2, Number 2, 1993
- Donn B. Parker:
From the Editor. 3-4
- Harry B. DeMaio:
Taking Fax Security Seriously. 5-9 - Donn B. Parker:
A Comprehensive List of Threats To Information. 10-14 - Philip Teplitzky:
Security in a Client/Server Environment. 15-18 - Cole Emerson:
Facing the Challenge of Vital Records Recovery. 19-23 - Michael I. Sobol:
An Overview of Encryption Products. 24-28
- William Hugh Murray:
Surveys of Information Security. 29-32
- Allen B. Lum:
Securing UNIX-Based Networks. 33-42 - Robert P. Campbell:
Hands-On Penetration Testing of Systems Controls. 43-50 - Gilbert W. Joseph, Terry J. Engle:
Controlling the Data Base Administrator. 51-62 - David S. Bauer:
Cost-Effective Development of Secure Applications. 63-71
Volume 2, Number 3, 1993
- Donn B. Parker:
From the Editor. 1-4
- Harry B. DeMaio:
A Situational Approach to Integrity. 5-9 - James Bidzos:
The Clipper Chip Controversy. 10-12 - Donn B. Parker:
Cryptographic Threat Analysis. 13-17 - Ralph Spencer Poore:
Security in Open Networks: A Contradiction in Terms? 18-22 - Clive Blatchford:
The Fight for International Security Solutions. 23-27 - Michael I. Sobol:
Telecommunications Security Products and Services. 28-33 - Robert R. Moeller:
Novel Approaches to Contingency Planning and Security. 34-37 - Peter D. Goldis:
Comparing MVS and UNIX Security: The View from the Glass House. 38-52 - Ray Kaplan, Joe Kovara:
Psychological Subversion of Information Systems. 53-62 - Judy K. Bell:
Protecting Communications Before Disaster Strikes. 63-72 - Andrew J. Logan:
Developing the Office Recovery Plan. 73-85
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.