Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/isjgp/isjgp3.bht:"
@article{DBLP:journals/isjgp/BeneskoT95, author = {Gary Benesko and Philip Teplitzky}, title = {{EDI} Integrity Controls}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {4}, pages = {21--25}, year = {1995}, url = {https://doi.org/10.1080/10658989509342475}, doi = {10.1080/10658989509342475}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BeneskoT95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Davidson95, author = {Mary Ann Davidson}, title = {Security in an Oracle Data Base Environment}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {4}, pages = {59--68}, year = {1995}, url = {https://doi.org/10.1080/10658989509342481}, doi = {10.1080/10658989509342481}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Davidson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/DeMaio95c, author = {Harry B. DeMaio}, title = {Information Protection and Business Process Reengineering}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {4}, pages = {5--10}, year = {1995}, url = {https://doi.org/10.1080/10658989509342472}, doi = {10.1080/10658989509342472}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/DeMaio95c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Dickson95, author = {Kirby G. Dickson}, title = {Information Anarchy and the Control of Cryptography}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {4}, pages = {52--58}, year = {1995}, url = {https://doi.org/10.1080/10658989509342480}, doi = {10.1080/10658989509342480}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Dickson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Hancock95, author = {William M. Hancock}, title = {Dial-Up Modem Protection Schemes}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {4}, pages = {42--51}, year = {1995}, url = {https://doi.org/10.1080/10658989509342479}, doi = {10.1080/10658989509342479}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Hancock95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Madsen95c, author = {Wayne Madsen}, title = {Information Police on the Internet}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {4}, pages = {11--15}, year = {1995}, url = {https://doi.org/10.1080/10658989509342473}, doi = {10.1080/10658989509342473}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Madsen95c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Murray95, author = {William Hugh Murray}, title = {Modern Cryptography}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {4}, pages = {30--33}, year = {1995}, url = {https://doi.org/10.1080/10658989509342477}, doi = {10.1080/10658989509342477}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Murray95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Parker95f, author = {Donn B. Parker}, title = {From the Editor}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {4}, pages = {3--4}, year = {1995}, url = {https://doi.org/10.1080/10658989509342471}, doi = {10.1080/10658989509342471}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Parker95f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Parker95g, author = {Donn B. Parker}, title = {Security Accountability in Job Performance}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {4}, pages = {16--20}, year = {1995}, url = {https://doi.org/10.1080/10658989509342474}, doi = {10.1080/10658989509342474}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Parker95g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sawicki95, author = {Ed Sawicki}, title = {Securing NetWare Against Trojan Horse Attacks}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {4}, pages = {34--41}, year = {1995}, url = {https://doi.org/10.1080/10658989509342478}, doi = {10.1080/10658989509342478}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Sawicki95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sobol95b, author = {Michael I. Sobol}, title = {Products Used to Secure Networked Macintosh Computers}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {4}, pages = {27--29}, year = {1995}, url = {https://doi.org/10.1080/10658989509342476}, doi = {10.1080/10658989509342476}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Sobol95b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BeneskoT94, author = {Gary Benesko and Philip Teplitzky}, title = {Security and Controls for {EDI}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {15--19}, year = {1994}, url = {https://doi.org/10.1080/10658989409342451}, doi = {10.1080/10658989409342451}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BeneskoT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/DeMaio94, author = {Harry B. DeMaio}, title = {Information Protection Standards in the 1990s: Part 2}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {1}, pages = {5--10}, year = {1994}, url = {https://doi.org/10.1080/10658989409342438}, doi = {10.1080/10658989409342438}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/DeMaio94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/DeMaio94a, author = {Harry B. DeMaio}, title = {Groupware - Hazardous to Your Health?}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {5--9}, year = {1994}, url = {https://doi.org/10.1080/10658989409342449}, doi = {10.1080/10658989409342449}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/DeMaio94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/DeMaio94b, author = {Harry B. DeMaio}, title = {Information Security: Behind the Telecommuting Power Curve}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {3}, pages = {5--10}, year = {1994}, url = {https://doi.org/10.1080/10658989409342461}, doi = {10.1080/10658989409342461}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/DeMaio94b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Erwin94, author = {Dan G. Erwin}, title = {The Thirty-Minute Risk Analysis}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {3}, pages = {37--44}, year = {1994}, url = {https://doi.org/10.1080/10658989409342467}, doi = {10.1080/10658989409342467}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Erwin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Fielding94, author = {Gordon Fielding}, title = {Electronic Eavesdropping: Solutions in Search of a Problem}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {1}, pages = {23--24}, year = {1994}, url = {https://doi.org/10.1080/10658989409342441}, doi = {10.1080/10658989409342441}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Fielding94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Fischer94, author = {Addison Fischer}, title = {Public Key Cryptography in Action}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {1}, pages = {57--70}, year = {1994}, url = {https://doi.org/10.1080/10658989409342446}, doi = {10.1080/10658989409342446}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Fischer94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/KaplanKZ94, author = {Ray Kaplan and Joe Kovara and Glen Zorn}, title = {Planning and Implementing Kerberos for Large Distributed Systems Part 1}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {1}, pages = {35--44}, year = {1994}, url = {https://doi.org/10.1080/10658989409342444}, doi = {10.1080/10658989409342444}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/KaplanKZ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/KaplanZK94, author = {Ray Kaplan and Glen Zorn and Joe Kovara}, title = {Planning and Implementing Kerberos for Large Distributed Systems: Part 2}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {36--44}, year = {1994}, url = {https://doi.org/10.1080/10658989409342455}, doi = {10.1080/10658989409342455}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/KaplanZK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Krause94, author = {Micki Krause}, title = {Writing a Communications Security Policy}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {1}, pages = {71--81}, year = {1994}, url = {https://doi.org/10.1080/10658989409342447}, doi = {10.1080/10658989409342447}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Krause94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Lambert94, author = {Sandra M. Lambert}, title = {Exploiting the Power of Message Authentication Codes}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {3}, pages = {53--63}, year = {1994}, url = {https://doi.org/10.1080/10658989409342469}, doi = {10.1080/10658989409342469}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Lambert94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Madsen94, author = {Wayne Madsen}, title = {Protecting Business Secrets in an {EDI/CALS} Environment}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {1}, pages = {11--16}, year = {1994}, url = {https://doi.org/10.1080/10658989409342439}, doi = {10.1080/10658989409342439}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Madsen94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Madsen94a, author = {Wayne Madsen}, title = {Net-Jacking on the National Information Highway}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {10--14}, year = {1994}, url = {https://doi.org/10.1080/10658989409342450}, doi = {10.1080/10658989409342450}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Madsen94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Madsen94b, author = {Wayne Madsen}, title = {International {ITSEC} Standards: {INTEL} Isn't Inside}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {3}, pages = {11--15}, year = {1994}, url = {https://doi.org/10.1080/10658989409342462}, doi = {10.1080/10658989409342462}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Madsen94b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Moeller94, author = {Robert R. Moeller}, title = {Two New Books on {UNIX} and Data Base Security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {1}, pages = {31--34}, year = {1994}, url = {https://doi.org/10.1080/10658989409342443}, doi = {10.1080/10658989409342443}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Moeller94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Moeller94a, author = {Robert R. Moeller}, title = {Communications Security, {LAN} Security, and Viruses}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {3}, pages = {32--36}, year = {1994}, url = {https://doi.org/10.1080/10658989409342466}, doi = {10.1080/10658989409342466}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Moeller94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Molini94, author = {James E. Molini}, title = {The New Frontier: Clieht/Server and Agent Technology}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {3}, pages = {64--71}, year = {1994}, url = {https://doi.org/10.1080/10658989409342470}, doi = {10.1080/10658989409342470}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Molini94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Murray94, author = {William Hugh Murray}, title = {Five Views of the Common Body of Knowledge}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {30--35}, year = {1994}, url = {https://doi.org/10.1080/10658989409342454}, doi = {10.1080/10658989409342454}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Murray94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Parker94, author = {Donn B. Parker}, title = {From the Editor}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {1}, pages = {3--4}, year = {1994}, url = {https://doi.org/10.1080/10658989409342437}, doi = {10.1080/10658989409342437}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Parker94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Parker94a, author = {Donn B. Parker}, title = {Demonstrating the Elements of Information Security with Loss Scenarios}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {1}, pages = {17--22}, year = {1994}, url = {https://doi.org/10.1080/10658989409342440}, doi = {10.1080/10658989409342440}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Parker94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Parker94b, author = {Donn B. Parker}, title = {From the Editor}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {3}, year = {1994}, url = {https://doi.org/10.1080/10658989409342448}, doi = {10.1080/10658989409342448}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Parker94b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Parker94c, author = {Donn B. Parker}, title = {A Guide to Selecting and Implementing Security Controls}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {75--86}, year = {1994}, url = {https://doi.org/10.1080/10658989409342459}, doi = {10.1080/10658989409342459}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Parker94c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Parker94d, author = {Donn B. Parker}, title = {From the Editor}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {3}, pages = {3--4}, year = {1994}, url = {https://doi.org/10.1080/10658989409342460}, doi = {10.1080/10658989409342460}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Parker94d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Parker94e, author = {Donn B. Parker}, title = {Update on Cryptography: Who Will Keep the Keys?}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {3}, pages = {16--22}, year = {1994}, url = {https://doi.org/10.1080/10658989409342463}, doi = {10.1080/10658989409342463}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Parker94e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Piazza94, author = {Joseph Piazza}, title = {A Multilevel Strategy for Combatting Viruses}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {3}, pages = {45--52}, year = {1994}, url = {https://doi.org/10.1080/10658989409342468}, doi = {10.1080/10658989409342468}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Piazza94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Poore94, author = {Ralph Spencer Poore}, title = {Reference Monitor Technology: Watching Your Every Keystroke}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {65--74}, year = {1994}, url = {https://doi.org/10.1080/10658989409342458}, doi = {10.1080/10658989409342458}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Poore94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Poore94a, author = {Ralph Spencer Poore}, title = {Remembered Secrets: Multisession Systems, LANs, and Other Hiding Places}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {3}, pages = {23--26}, year = {1994}, url = {https://doi.org/10.1080/10658989409342464}, doi = {10.1080/10658989409342464}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Poore94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Runge94, author = {Larry Runge}, title = {Security and Data Integrity in a Client-Server Environment}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {1}, pages = {45--56}, year = {1994}, url = {https://doi.org/10.1080/10658989409342445}, doi = {10.1080/10658989409342445}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Runge94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Smith94, author = {Robert E. Smith}, title = {Proactive Solutions for Multinetwork Security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {47--55}, year = {1994}, url = {https://doi.org/10.1080/10658989409342456}, doi = {10.1080/10658989409342456}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Smith94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sobol94, author = {Michael I. Sobol}, title = {Products for Media Backup and Recovery}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {1}, pages = {25--30}, year = {1994}, url = {https://doi.org/10.1080/10658989409342442}, doi = {10.1080/10658989409342442}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Sobol94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sobol94a, author = {Michael I. Sobol}, title = {Anti-Virus Software}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {24--29}, year = {1994}, url = {https://doi.org/10.1080/10658989409342453}, doi = {10.1080/10658989409342453}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Sobol94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sobol94b, author = {Michael I. Sobol}, title = {Data Encryption}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {3}, pages = {27--31}, year = {1994}, url = {https://doi.org/10.1080/10658989409342465}, doi = {10.1080/10658989409342465}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Sobol94b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Stansell-Gamm94, author = {Martha Stansell{-}Gamm}, title = {Responding to Computer Crime: {A} Security Practitioner's Guide}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {56--64}, year = {1994}, url = {https://doi.org/10.1080/10658989409342457}, doi = {10.1080/10658989409342457}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Stansell-Gamm94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Turner94, author = {Geoffrey W. Turner}, title = {Cryptography: Beyond Computer Crime}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {3}, number = {2}, pages = {20--23}, year = {1994}, url = {https://doi.org/10.1080/10658989409342452}, doi = {10.1080/10658989409342452}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Turner94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.