- 1997
- Stephane G. Bouniol:
The puzzle theorem - The less I know, the less I can disclose ... Comput. Secur. 16(2): 115-125 (1997) - Brian Boyce:
Cyber extortion - The corporate response. Comput. Secur. 16(1): 25-28 (1997) - Julie Bunnell, John Podd, Ron Henderson, Renee Napier, James Kennedy-Moffat:
Cognitive, associative and conventional passwords: Recall and guessing rates. Comput. Secur. 16(7): 629-641 (1997) - Zbigniew Ciechanowicz:
Risk analysis: requirements, conflicts and problems. Comput. Secur. 16(3): 223-232 (1997) - Andrew J. Clark:
Key recovery - why, how, who?. Comput. Secur. 16(8): 669-674 (1997) - Fred Cohen:
Information system attacks: A preliminary classification scheme. Comput. Secur. 16(1): 29-46 (1997) - Fred Cohen:
Information system defences: A preliminary classification scheme. Comput. Secur. 16(2): 94-114 (1997) - Thomas Finne:
What are the information security risks in decision support systems and data warehousing? Comput. Secur. 16(3): 197-204 (1997) - Thomas Finne:
Information security implemented in: The theory on stock market efficiency, Markowitz's portfolio theory and porter's value chain. Comput. Secur. 16(6): 469-479 (1997) - Simon N. Foley:
Building Chinese walls in standard unixTM. Comput. Secur. 16(6): 551-563 (1997) - Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic:
Two-phase cryptographic key recovery system. Comput. Secur. 16(6): 481-506 (1997) - Dimitris Gritzalis:
A baseline security policy for distributed healthcare information systems. Comput. Secur. 16(8): 709-719 (1997) - Nigel Hickson:
Encryption policy - A UK perspective. Comput. Secur. 16(7): 583-589 (1997) - Harold Joseph Highland:
Random bits & bytes & bytes. Comput. Secur. 16(1): 4-13 (1997) - Harold Joseph Highland:
Current literature The 19th National Information Systems Security Conference. Comput. Secur. 16(1): 47-59 (1997) - Harold Joseph Highland:
IFIP/SEC'97 conference proceedings. Comput. Secur. 16(3): 205 (1997) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 16(4): 266-275 (1997) - Harold Joseph Highland:
The threats on the web. Comput. Secur. 16(5): 365-368 (1997) - Harold Joseph Highland:
Data encryption: A non-mathematical approach. Comput. Secur. 16(5): 369-386 (1997) - Harold Joseph Highland:
Historical bits & bytes. Comput. Secur. 16(5): 387-411 (1997) - Harold Joseph Highland:
A history of computer viruses - Introduction. Comput. Secur. 16(5): 412-415 (1997) - Harold Joseph Highland:
A history of computer viruses - The famous 'trio'. Comput. Secur. 16(5): 416-429 (1997) - Harold Joseph Highland:
A history of computer viruses: Three special viruses. Comput. Secur. 16(5): 430-438 (1997) - Harold Joseph Highland:
Procedures to reduce the computer virus threat. Comput. Secur. 16(5): 439-449 (1997) - Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf:
Protecting databases from inference attacks. Comput. Secur. 16(8): 687-708 (1997) - Andy Jones:
Penetration testing and system audit - experience gained during the investigation of systems within the UK. Comput. Secur. 16(7): 595-602 (1997) - Alasdair Kemp:
Embedded systems: The other problem. Comput. Secur. 16(8): 663-668 (1997) - Gerald L. Kovacich:
Information warfare and the information systems security professional. Comput. Secur. 16(1): 14-24 (1997) - Gerald L. Kovacich:
The ISSO must understand the business and management environment. Comput. Secur. 16(4): 321-326 (1997) - Gerald L. Kovacich:
ISSO career development. Comput. Secur. 16(6): 455-458 (1997)