default search action
Computers & Security, Volume 5
Volume 5, Number 1, March 1986
- Harold Joseph Highland:
In this issue... 1 - Bernard P. Zajac Jr.:
What to do when you have reason to believe your computer has been compromised. 11-16 - A. Kinnon, Robert H. Davis:
Audit and security implications of electronic funds transfer. 17-23 - Ted Goeltz:
Why not DES? 24-27 - Robert M. Harper Jr.:
Internal control in local area networks: An accountant's perspective. 28-35 - R. van den Assem, W. J. van Elk:
A chosen-plaintext attack on the microsoft BASIC protection. 36-45 - Ronald Paans, I. S. Herschberg:
How to control MVS user supervisor calls. 46-54 - Kenneth Owen:
Computer security: IFIP addresses the practical issues. 68-72 - Per L. Hoving:
System security: The technical challenge. 74-79
Volume 5, Number 2, June 1986
- Harold Joseph Highland:
In this issue... 83 - Johan Essén:
New member of the International Board of Editors. 84 - Harold Joseph Highland:
Electromagnetic radiation revisited. 85-93 - Willis H. Ware:
Emerging privacy issues. 101-113 - Charles Cresson Wood, Howard M. Zeidler:
Security modules: Potent information security system components. 114-121 - L. Hoebeke:
Computer security - Prevention: Lessons from the operation of a nuclear power plant. 122-127 - Rick F. van der Lans:
Data security in a relational database environment. 128-134 - Roy Martin Richards Jr., Jan Yestingsmeier:
Risk management - a key to security in the electronic funds transfer system. 135-140 - Matt Bishop:
A pauper's callback scheme. 141-144 - Cees J. A. Jansen:
On the key storage requirements for secure terminals. 145-149 - Willis H. Ware:
Emerging privacy issues. 167 - John M. Carroll, Helmut Jürgensen:
Design of a secure relational data base. 167 - Viiveke Fåk:
Software versus hardware encryption - Is there any difference today? 167 - Frederick G. Tompkins, Russel S. Rice:
Intergrating security activities into the software development life cycle and the software quality assurance process. 167 - June M. Power, Steve R. Wilbur:
Authentication in a heterogeneous environment. 167 - T. K. Worthington, J. J. Chainer, J. D. Willford, S. C. Gunderson:
IBM dynamic signature verification. 167-168 - Hans-Jürgen Kugler:
Concepts of protection in the IFIP WG 2.7 reference model for command and response languages. 168 - Ivan Ekebrink:
Security of electronic transactions. 168 - John G. Beatson:
Development and organization of the audit and security functions. 168 - William T. Tener:
Decision support systems - A necessity for effective auditing of controls. 168 - Roger T. Doswell:
The audit, control and security of the project life cycle - Pre-implementation stage. 168 - Peter P. C. H. Kingston, Martin Goulbourn:
Security for small business computers. 168 - Philip M. Stanley:
Educating computer crime investigators. 168-169 - Gerald E. Murine:
Producing reliable, secure software. 169 - Charles Cresson Wood:
Establishing technical systems security standards at a large multinational bank. 169 - Donald W. Davies:
How to use the DES safely. 169
Volume 5, Number 3, September 1986
- Harold Joseph Highland:
In this issue ... 179-180 - Harold Joseph Highland, Viiveke Fåk:
Electromagnetic radiation revisited, part II. 181-184 - Charles Cresson Wood:
Establishing internal technical systems security standards. 193-200 - John G. Beatson:
Managing the EDP audit and security functions. 201-206 - Roy Martin Richards Jr.:
Insuring computer risks. 207-210 - Lance J. Hoffman, Lucy M. Moran:
Societal vulnerability to computer system failures. 211-217 - Frederick G. Tompkins, Russell S. Rice:
Integrating security activities into the software development life cycle and the software quality assurance process. 218-242 - G. M. J. Pluimakers, J. van Leeuwen:
Authentication: A concise survey. 243-250 - Yeheskel Lapid, Niv Ahituv, Seev Neumann:
Approaches to handling "Trojan Horse" threats. 251-256
Volume 5, Number 4, December 1986
- Harold Joseph Highland:
In this issue ... 277-278 - William T. Tener:
Detection of control deterioration using decision support systems. 290-295 - Linda S. Rutledge, Lance J. Hoffman:
A survey of issues in computer network security. 296-308 - Philip M. Stanley:
Computer crime investigation and investigators. 309-313 - Paul A. Karger:
Authentication and discretionary access control in computer networks. 314-324 - Ivan Ekebrink:
Data security in terminalized system. 325-327 - Vangalur S. Alagar:
A human approach to the technological challenges in data security. 328-335 - Gerald E. Murine:
Secure software's impact on reliability. 336-339 - Harold Joseph Highland:
How to modify a microcomputer operating system for added security. 340-343 - Hilmi Erdem:
Host cryptographic operations: A software implementation. 344-346 - Patrick Leahy:
Privacy and progress. 347-349
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.