- Charles Cresson Wood:
A context for information systems security planning. Comput. Secur. 7(5): 455-465 (1988) - Abstracts of recent articles and literature. Comput. Secur. 7(1): 101-110 (1988)
- Abstracts of recent articles and literature. Comput. Secur. 7(2): 213-223 (1988)
- Abstracts of recent articles and literature. Comput. Secur. 7(3): 320-331 (1988)
- Abstracts of recent articles and literature. Comput. Secur. 7(4): 423-434 (1988)
- Abstracts of recent articles and literature. Comput. Secur. 7(5): 509-520 (1988)
- Abstracts of recent articles and literature. Comput. Secur. 7(5): 521-529 (1988)
- Abstracts of recent articles and literature. Comput. Secur. 7(6): 609-615 (1988)
- Bernard P. Zajac Jr.:
Dial-up communication lines: Can they be secured? Comput. Secur. 7(1): 35-36 (1988) - Bernard P. Zajac Jr.:
Personnel: The other half of data security. Comput. Secur. 7(2): 131-132 (1988) - Bernard P. Zajac Jr.:
Distributed data processing: New problems. Comput. Secur. 7(3): 249-250 (1988) - Bernard P. Zajac Jr.:
Viruses: Should we quit talking about them? Comput. Secur. 7(5): 471-472 (1988)