Search dblp for Publications

export results for "toc:db/journals/isjgp/isjgp3.bht:"

 download as .bib file

@article{DBLP:journals/isjgp/BeneskoT95,
  author       = {Gary Benesko and
                  Philip Teplitzky},
  title        = {{EDI} Integrity Controls},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {4},
  pages        = {21--25},
  year         = {1995},
  url          = {https://doi.org/10.1080/10658989509342475},
  doi          = {10.1080/10658989509342475},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/BeneskoT95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Davidson95,
  author       = {Mary Ann Davidson},
  title        = {Security in an Oracle Data Base Environment},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {4},
  pages        = {59--68},
  year         = {1995},
  url          = {https://doi.org/10.1080/10658989509342481},
  doi          = {10.1080/10658989509342481},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Davidson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/DeMaio95c,
  author       = {Harry B. DeMaio},
  title        = {Information Protection and Business Process Reengineering},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {4},
  pages        = {5--10},
  year         = {1995},
  url          = {https://doi.org/10.1080/10658989509342472},
  doi          = {10.1080/10658989509342472},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/DeMaio95c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Dickson95,
  author       = {Kirby G. Dickson},
  title        = {Information Anarchy and the Control of Cryptography},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {4},
  pages        = {52--58},
  year         = {1995},
  url          = {https://doi.org/10.1080/10658989509342480},
  doi          = {10.1080/10658989509342480},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Dickson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Hancock95,
  author       = {William M. Hancock},
  title        = {Dial-Up Modem Protection Schemes},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {4},
  pages        = {42--51},
  year         = {1995},
  url          = {https://doi.org/10.1080/10658989509342479},
  doi          = {10.1080/10658989509342479},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Hancock95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Madsen95c,
  author       = {Wayne Madsen},
  title        = {Information Police on the Internet},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {4},
  pages        = {11--15},
  year         = {1995},
  url          = {https://doi.org/10.1080/10658989509342473},
  doi          = {10.1080/10658989509342473},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Madsen95c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Murray95,
  author       = {William Hugh Murray},
  title        = {Modern Cryptography},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {4},
  pages        = {30--33},
  year         = {1995},
  url          = {https://doi.org/10.1080/10658989509342477},
  doi          = {10.1080/10658989509342477},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Murray95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Parker95f,
  author       = {Donn B. Parker},
  title        = {From the Editor},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {4},
  pages        = {3--4},
  year         = {1995},
  url          = {https://doi.org/10.1080/10658989509342471},
  doi          = {10.1080/10658989509342471},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Parker95f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Parker95g,
  author       = {Donn B. Parker},
  title        = {Security Accountability in Job Performance},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {4},
  pages        = {16--20},
  year         = {1995},
  url          = {https://doi.org/10.1080/10658989509342474},
  doi          = {10.1080/10658989509342474},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Parker95g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sawicki95,
  author       = {Ed Sawicki},
  title        = {Securing NetWare Against Trojan Horse Attacks},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {4},
  pages        = {34--41},
  year         = {1995},
  url          = {https://doi.org/10.1080/10658989509342478},
  doi          = {10.1080/10658989509342478},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sawicki95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sobol95b,
  author       = {Michael I. Sobol},
  title        = {Products Used to Secure Networked Macintosh Computers},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {4},
  pages        = {27--29},
  year         = {1995},
  url          = {https://doi.org/10.1080/10658989509342476},
  doi          = {10.1080/10658989509342476},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sobol95b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BeneskoT94,
  author       = {Gary Benesko and
                  Philip Teplitzky},
  title        = {Security and Controls for {EDI}},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {15--19},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342451},
  doi          = {10.1080/10658989409342451},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/BeneskoT94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/DeMaio94,
  author       = {Harry B. DeMaio},
  title        = {Information Protection Standards in the 1990s: Part 2},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {1},
  pages        = {5--10},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342438},
  doi          = {10.1080/10658989409342438},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/DeMaio94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/DeMaio94a,
  author       = {Harry B. DeMaio},
  title        = {Groupware - Hazardous to Your Health?},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {5--9},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342449},
  doi          = {10.1080/10658989409342449},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/DeMaio94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/DeMaio94b,
  author       = {Harry B. DeMaio},
  title        = {Information Security: Behind the Telecommuting Power Curve},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {3},
  pages        = {5--10},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342461},
  doi          = {10.1080/10658989409342461},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/DeMaio94b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Erwin94,
  author       = {Dan G. Erwin},
  title        = {The Thirty-Minute Risk Analysis},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {3},
  pages        = {37--44},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342467},
  doi          = {10.1080/10658989409342467},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Erwin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Fielding94,
  author       = {Gordon Fielding},
  title        = {Electronic Eavesdropping: Solutions in Search of a Problem},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {1},
  pages        = {23--24},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342441},
  doi          = {10.1080/10658989409342441},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Fielding94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Fischer94,
  author       = {Addison Fischer},
  title        = {Public Key Cryptography in Action},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {1},
  pages        = {57--70},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342446},
  doi          = {10.1080/10658989409342446},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Fischer94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/KaplanKZ94,
  author       = {Ray Kaplan and
                  Joe Kovara and
                  Glen Zorn},
  title        = {Planning and Implementing Kerberos for Large Distributed Systems Part
                  1},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {1},
  pages        = {35--44},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342444},
  doi          = {10.1080/10658989409342444},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/KaplanKZ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/KaplanZK94,
  author       = {Ray Kaplan and
                  Glen Zorn and
                  Joe Kovara},
  title        = {Planning and Implementing Kerberos for Large Distributed Systems:
                  Part 2},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {36--44},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342455},
  doi          = {10.1080/10658989409342455},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/KaplanZK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Krause94,
  author       = {Micki Krause},
  title        = {Writing a Communications Security Policy},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {1},
  pages        = {71--81},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342447},
  doi          = {10.1080/10658989409342447},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Krause94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Lambert94,
  author       = {Sandra M. Lambert},
  title        = {Exploiting the Power of Message Authentication Codes},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {3},
  pages        = {53--63},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342469},
  doi          = {10.1080/10658989409342469},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Lambert94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Madsen94,
  author       = {Wayne Madsen},
  title        = {Protecting Business Secrets in an {EDI/CALS} Environment},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {1},
  pages        = {11--16},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342439},
  doi          = {10.1080/10658989409342439},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Madsen94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Madsen94a,
  author       = {Wayne Madsen},
  title        = {Net-Jacking on the National Information Highway},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {10--14},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342450},
  doi          = {10.1080/10658989409342450},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Madsen94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Madsen94b,
  author       = {Wayne Madsen},
  title        = {International {ITSEC} Standards: {INTEL} Isn't Inside},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {3},
  pages        = {11--15},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342462},
  doi          = {10.1080/10658989409342462},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Madsen94b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Moeller94,
  author       = {Robert R. Moeller},
  title        = {Two New Books on {UNIX} and Data Base Security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {1},
  pages        = {31--34},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342443},
  doi          = {10.1080/10658989409342443},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Moeller94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Moeller94a,
  author       = {Robert R. Moeller},
  title        = {Communications Security, {LAN} Security, and Viruses},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {3},
  pages        = {32--36},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342466},
  doi          = {10.1080/10658989409342466},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Moeller94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Molini94,
  author       = {James E. Molini},
  title        = {The New Frontier: Clieht/Server and Agent Technology},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {3},
  pages        = {64--71},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342470},
  doi          = {10.1080/10658989409342470},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Molini94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Murray94,
  author       = {William Hugh Murray},
  title        = {Five Views of the Common Body of Knowledge},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {30--35},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342454},
  doi          = {10.1080/10658989409342454},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Murray94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Parker94,
  author       = {Donn B. Parker},
  title        = {From the Editor},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {1},
  pages        = {3--4},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342437},
  doi          = {10.1080/10658989409342437},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Parker94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Parker94a,
  author       = {Donn B. Parker},
  title        = {Demonstrating the Elements of Information Security with Loss Scenarios},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {1},
  pages        = {17--22},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342440},
  doi          = {10.1080/10658989409342440},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Parker94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Parker94b,
  author       = {Donn B. Parker},
  title        = {From the Editor},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {3},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342448},
  doi          = {10.1080/10658989409342448},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Parker94b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Parker94c,
  author       = {Donn B. Parker},
  title        = {A Guide to Selecting and Implementing Security Controls},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {75--86},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342459},
  doi          = {10.1080/10658989409342459},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Parker94c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Parker94d,
  author       = {Donn B. Parker},
  title        = {From the Editor},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {3},
  pages        = {3--4},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342460},
  doi          = {10.1080/10658989409342460},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Parker94d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Parker94e,
  author       = {Donn B. Parker},
  title        = {Update on Cryptography: Who Will Keep the Keys?},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {3},
  pages        = {16--22},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342463},
  doi          = {10.1080/10658989409342463},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Parker94e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Piazza94,
  author       = {Joseph Piazza},
  title        = {A Multilevel Strategy for Combatting Viruses},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {3},
  pages        = {45--52},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342468},
  doi          = {10.1080/10658989409342468},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Piazza94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Poore94,
  author       = {Ralph Spencer Poore},
  title        = {Reference Monitor Technology: Watching Your Every Keystroke},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {65--74},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342458},
  doi          = {10.1080/10658989409342458},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Poore94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Poore94a,
  author       = {Ralph Spencer Poore},
  title        = {Remembered Secrets: Multisession Systems, LANs, and Other Hiding Places},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {3},
  pages        = {23--26},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342464},
  doi          = {10.1080/10658989409342464},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Poore94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Runge94,
  author       = {Larry Runge},
  title        = {Security and Data Integrity in a Client-Server Environment},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {1},
  pages        = {45--56},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342445},
  doi          = {10.1080/10658989409342445},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Runge94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Smith94,
  author       = {Robert E. Smith},
  title        = {Proactive Solutions for Multinetwork Security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {47--55},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342456},
  doi          = {10.1080/10658989409342456},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Smith94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sobol94,
  author       = {Michael I. Sobol},
  title        = {Products for Media Backup and Recovery},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {1},
  pages        = {25--30},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342442},
  doi          = {10.1080/10658989409342442},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sobol94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sobol94a,
  author       = {Michael I. Sobol},
  title        = {Anti-Virus Software},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {24--29},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342453},
  doi          = {10.1080/10658989409342453},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sobol94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sobol94b,
  author       = {Michael I. Sobol},
  title        = {Data Encryption},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {3},
  pages        = {27--31},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342465},
  doi          = {10.1080/10658989409342465},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sobol94b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Stansell-Gamm94,
  author       = {Martha Stansell{-}Gamm},
  title        = {Responding to Computer Crime: {A} Security Practitioner's Guide},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {56--64},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342457},
  doi          = {10.1080/10658989409342457},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Stansell-Gamm94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Turner94,
  author       = {Geoffrey W. Turner},
  title        = {Cryptography: Beyond Computer Crime},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {3},
  number       = {2},
  pages        = {20--23},
  year         = {1994},
  url          = {https://doi.org/10.1080/10658989409342452},
  doi          = {10.1080/10658989409342452},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Turner94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics