


default search action
Information Systems Security, Volume 2
Volume 2, Number 1, 1993
- Donn B. Parker:

From the Editor. 3-4
- Harry B. DeMaio:

Reevaluating Information Ownership. 5-8
- Chris McDonald:

Computers at Risk: Does Anyone Remember?. 9-12
- Donn B. Parker:

Confidentiality of Information and Personal Privacy. 13-17
- Ralph Spencer Poore

:
Is Network Security a Contradiction in Terms? 18-21
- William List:

Is Error Detection a Security Concern? 22-24
- Michael I. Sobol:

Macintosh Security and Data Integrity Products. 25-29
- Robert R. Moeller:

Network Security. 30-32
- Peter D. Goldis:

MVS Integrity: The Intruder's Point of View. 33-39 - Richard L. Baskerville:

Information Security: Adapting to Survive. 40-47 - Cheryl W. Helsing:

A Customer-Driven Approach to Business Resumption Planning. 48-56 - Ravi S. Sandhu, Sushil Jajodia:

Limitations of Relational Data Base Access Controls. 57-72
Volume 2, Number 2, 1993
- Donn B. Parker:

From the Editor. 3-4
- Harry B. DeMaio:

Taking Fax Security Seriously. 5-9 - Donn B. Parker:

A Comprehensive List of Threats To Information. 10-14 - Philip Teplitzky:

Security in a Client/Server Environment. 15-18 - Cole Emerson:

Facing the Challenge of Vital Records Recovery. 19-23 - Michael I. Sobol:

An Overview of Encryption Products. 24-28
- William Hugh Murray:

Surveys of Information Security. 29-32
- Allen B. Lum:

Securing UNIX-Based Networks. 33-42 - Robert P. Campbell:

Hands-On Penetration Testing of Systems Controls. 43-50 - Gilbert W. Joseph, Terry J. Engle:

Controlling the Data Base Administrator. 51-62 - David S. Bauer:

Cost-Effective Development of Secure Applications. 63-71
Volume 2, Number 3, 1993
- Donn B. Parker:

From the Editor. 1-4
- Harry B. DeMaio:

A Situational Approach to Integrity. 5-9 - James Bidzos:

The Clipper Chip Controversy. 10-12 - Donn B. Parker:

Cryptographic Threat Analysis. 13-17 - Ralph Spencer Poore

:
Security in Open Networks: A Contradiction in Terms? 18-22 - Clive Blatchford:

The Fight for International Security Solutions. 23-27 - Michael I. Sobol:

Telecommunications Security Products and Services. 28-33 - Robert R. Moeller:

Novel Approaches to Contingency Planning and Security. 34-37 - Peter D. Goldis:

Comparing MVS and UNIX Security: The View from the Glass House. 38-52 - Ray Kaplan, Joe Kovara:

Psychological Subversion of Information Systems. 53-62 - Judy K. Bell:

Protecting Communications Before Disaster Strikes. 63-72 - Andrew J. Logan:

Developing the Office Recovery Plan. 73-85

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














