default search action
Bernard P. Zajac Jr.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 1995
- [j46]Bernard P. Zajac Jr.:
The Wonderful World of the Web. Comput. Law Secur. Rev. 11(2): 90 (1995) - 1994
- [j45]Bernard P. Zajac Jr.:
Clinton administration proposes national telecommunications policy. Comput. Law Secur. Rev. 10(2): 96 (1994) - [j44]Bernard P. Zajac Jr.:
US focus. Comput. Law Secur. Rev. 10(6): 322-323 (1994) - [j43]Bernard P. Zajac Jr.:
Cost effectiveness of anti-viral scanners. Comput. Secur. 13(5): 392-400 (1994) - 1992
- [j42]Bernard P. Zajac Jr.:
The most 'useful' computer virus contest. Comput. Law Secur. Rev. 8(2): 83 (1992) - [j41]Bernard P. Zajac Jr.:
The Michelangelo virus - was it a failure? Comput. Law Secur. Rev. 8(3): 137 (1992) - [j40]Bernard P. Zajac Jr.:
The Chicago flood of 1992. Comput. Law Secur. Rev. 8(4): 184 (1992) - [j39]Bernard P. Zajac Jr.:
Computer viral risks - how bad is the threat? Comput. Secur. 11(1): 29-34 (1992) - [j38]Bernard P. Zajac Jr.:
Cost-effectiveness of anti-viral software. Comput. Secur. 11(3): 217-226 (1992) - 1991
- [j37]Bernard P. Zajac Jr.:
US focus. Comput. Law Secur. Rev. 6(5): 31 (1991) - [j36]Bernard P. Zajac Jr.:
Ethics in computing - Are there any? Comput. Law Secur. Rev. 6(6): 37-38 (1991) - [j35]Bernard P. Zajac Jr.:
Managing information security - A non-technical management guide: by Ken Wong and Steve Watt 1990 (Elsevier Advance Technology & Computer Weekly Publications, 327pp) UK £85.00/US $ 153.00 ISBN: 0-946395-63-2. Comput. Law Secur. Rev. 7(2): 76 (1991) - [j34]Bernard P. Zajac Jr.:
Computer viral risks - is the worst yet to come? an eerie look into the future. Comput. Law Secur. Rev. 7(2): 77-78 (1991) - [j33]Bernard P. Zajac Jr.:
Ethics and computing (Part II). Comput. Law Secur. Rev. 7(2): 83 (1991) - [j32]Bernard P. Zajac Jr.:
US focus. Comput. Law Secur. Rev. 7(3): 131 (1991) - 1990
- [j31]Bernard P. Zajac Jr.:
The 1989 California eartquake - Did we learn anything? Comput. Law Secur. Rev. 5(5): 26 (1990) - [j30]Bernard P. Zajac Jr.:
Computer & security's computer virus handbook: Dr Harold Joseph Highland FICS 1990 (Elsevier Advanced Technology, 375pp) £85.00/US$ 153.00 ISBN: 0946395462. Comput. Law Secur. Rev. 6(1): 12 (1990) - [j29]Bernard P. Zajac Jr.:
Computer hacking - The new boom industry. Comput. Law Secur. Rev. 6(4): 29 (1990) - [j28]Bernard P. Zajac Jr.:
Computer viruses: Can they be prevented? Comput. Secur. 9(1): 25-31 (1990) - [j27]Bernard P. Zajac Jr.:
People: The "other" side of computer security. Comput. Secur. 9(4): 301-303 (1990) - [j26]Bernard P. Zajac Jr.:
The 1990s - what will they hold? Comput. Secur. 9(6): 503-507 (1990) - [j25]Bernard P. Zajac Jr.:
Interview with Clifford Stoll. Comput. Secur. 9(7): 601-603 (1990) - 1989
- [j24]Bernard P. Zajac Jr.:
Virus hits major US computer network. Comput. Law Secur. Rev. 4(5): 34-35 (1989) - [j23]Bernard P. Zajac Jr.:
Computer viruses can they be prevented? Comput. Law Secur. Rev. 5(1): 18-21 (1989) - [j22]Bernard P. Zajac Jr.:
Virus hits Michigan Medical Centers. Comput. Law Secur. Rev. 5(2): 28 (1989) - [j21]Bernard P. Zajac Jr.:
New technologies mean new threats. Comput. Law Secur. Rev. 5(3): 17-18 (1989) - [j20]Bernard P. Zajac Jr.:
Legal options to computer viruses. Comput. Secur. 8(1): 25-27 (1989) - [j19]Bernard P. Zajac Jr.:
Disaster recovery - are you really ready? Comput. Secur. 8(4): 317-323 (1989) - 1988
- [j18]Bernard P. Zajac Jr.:
The latest news from the US. Comput. Law Secur. Rev. 3(5): 31-32 (1988) - [j17]Bernard P. Zajac Jr.:
US focus. Comput. Law Secur. Rev. 3(6): 36 (1988) - [j16]Bernard P. Zajac Jr.:
Computer viruses: The new global threat (part II). Comput. Law Secur. Rev. 4(2): 30-31 (1988) - [j15]Bernard P. Zajac Jr.:
The legal implications of viruses. Comput. Law Secur. Rev. 4(4): 36-37 (1988) - [j14]Bernard P. Zajac Jr.:
Dial-up communication lines: Can they be secured? Comput. Secur. 7(1): 35-36 (1988) - [j13]Bernard P. Zajac Jr.:
Personnel: The other half of data security. Comput. Secur. 7(2): 131-132 (1988) - [j12]Bernard P. Zajac Jr.:
Distributed data processing: New problems. Comput. Secur. 7(3): 249-250 (1988) - [j11]Bernard P. Zajac Jr.:
Viruses: Should we quit talking about them? Comput. Secur. 7(5): 471-472 (1988) - 1987
- [j10]Bernard P. Zajac Jr.:
US focus. Comput. Law Secur. Rev. 2(6): 17-18 (1987) - [j9]Bernard P. Zajac Jr.:
US focus. Comput. Law Secur. Rev. 3(1): 23-24 (1987) - [j8]Bernard P. Zajac Jr.:
US focus. Comput. Law Secur. Rev. 3(2): 24-27 (1987) - [j7]Bernard P. Zajac Jr.:
Computer crime - what to do before it happens. Comput. Law Secur. Rev. 3(3): 14-18 (1987) - [j6]Bernard P. Zajac Jr.:
US focus. Comput. Law Secur. Rev. 3(3): 28-29 (1987) - [j5]Bernard P. Zajac Jr.:
US focus. Comput. Law Secur. Rev. 3(4): 24-26 (1987) - 1986
- [j4]Bernard P. Zajac Jr.:
The latest news from the US. Comput. Law Secur. Rev. 2(2): 17-18 (1986) - [j3]Bernard P. Zajac Jr.:
What to do when you have reason to believe your computer has been compromised. Comput. Secur. 5(1): 11-16 (1986) - 1985
- [j2]Bernard P. Zajac Jr.:
Report on electronic funds transfer security in U.S. Comput. Law Secur. Rev. 1(4): 13-14 (1985) - [j1]Bernard P. Zajac Jr.:
News and security update from the U.S. Comput. Law Secur. Rev. 1(4): 26-27 (1985)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint