- Victor L. Voydock, Stephen T. Kent:
Security mechanisms in a transport layer protocol. Comput. Secur. 4(4): 325-341 (1985) - Ken Wong:
Computer crime - Risk management and computer security. Comput. Secur. 4(4): 287-295 (1985) - Charles Cresson Wood:
Floppy diskette security measures. Comput. Secur. 4(3): 223-228 (1985) - Charles Cresson Wood:
Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50. Comput. Secur. 4(3): 248-249 (1985) - Gee Kin Yeo:
Incorporating access control in forms systems. Comput. Secur. 4(2): 109-122 (1985)