- Harold Joseph Highland:
Investigating a reported virus attack. Comput. Secur. 7(4): 344-345 (1988) - Harold Joseph Highland:
Virus filter update. Comput. Secur. 7(4): 345 (1988) - Harold Joseph Highland:
The anatomy of a DOS Disk. Comput. Secur. 7(4): 357-360 (1988) - Harold Joseph Highland:
The brain virus: Fact and fantasy. Comput. Secur. 7(4): 367-370 (1988) - Harold Joseph Highland:
From the editor. Comput. Secur. 7(5): 438 (1988) - Harold Joseph Highland:
U.S. Congress computer virus report. Comput. Secur. 7(5): 439 (1988) - Harold Joseph Highland:
Write-protect tab warning. Comput. Secur. 7(5): 439 (1988) - Harold Joseph Highland:
Virus filter evaluation. Comput. Secur. 7(5): 440 (1988) - Harold Joseph Highland:
Virus filter update. Comput. Secur. 7(5): 441-442 (1988) - Harold Joseph Highland:
Computer viruses: Media hyperbole, errors and ignorance. Comput. Secur. 7(5): 442-450 (1988) - Harold Joseph Highland:
From the editor. Comput. Secur. 7(6): 532 (1988) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 7(6): 533-541 (1988) - Harold Joseph Highland:
How to protect a microcomputer system. Comput. Secur. 7(1): 6-7 (1988) - Harold Joseph Highland:
Chernobyl computer communications. Comput. Secur. 7(1): 7-9 (1988) - Harold Joseph Highland:
Electromagnetic interference. Comput. Secur. 7(1): 9-10 (1988) - Harold Joseph Highland:
IFIP/Sec '88. Comput. Secur. 7(1): 10 (1988) - Harold Joseph Highland:
For your information. Comput. Secur. 7(1): 10-11 (1988) - Harold Joseph Highland:
Product reviews. Comput. Secur. 7(1): 13-18 (1988) - Harold Joseph Highland:
How secure are fiber optics communications? Comput. Secur. 7(1): 25-26 (1988) - Harold Joseph Highland:
Secretdisk II - transparent automatic encryption. Comput. Secur. 7(1): 27-34 (1988) - Harold Joseph Highland:
Program aids for office automation security. Comput. Secur. 7(1): 37-43 (1988) - Harold Joseph Highland:
From the editor. Comput. Secur. 7(2): 114 (1988) - Harold Joseph Highland:
Anatomy of a virus attack. Comput. Secur. 7(2): 145-150 (1988) - Harold Joseph Highland:
An overview of 18 virus protection products. Comput. Secur. 7(2): 157-161 (1988) - Harold Joseph Highland:
How to combat a computer virus. Comput. Secur. 7(2): 157 (1988) - Harold Joseph Highland:
Open Sesame-Hackers welcome. Comput. Secur. 7(3): 232-233 (1988) - Harold Joseph Highland:
Security director's dilemma. Comput. Secur. 7(3): 233-235 (1988) - Harold Joseph Highland:
How to test a virus filter without a virus. Comput. Secur. 7(3): 235-237 (1988) - Harold Joseph Highland:
Virus disaster red book. Comput. Secur. 7(3): 237 (1988) - Harold Joseph Highland:
Blitzed by a computer virus. Comput. Secur. 7(3): 237-239 (1988)