export record
dblp key:
journals/compsec/Kovacich97c share record
persistent URL:
Gerald L. Kovacich : Information systems security metrics management. Comput. Secur. 16 (7 ) : 610-618 (1997 )export record
dblp key:
journals/compsec/Kovacich97d share record
persistent URL:
Gerald L. Kovacich : How to market yourself as an ISSO. Comput. Secur. 16 (8 ) : 657-662 (1997 )export record
dblp key:
journals/compsec/KrsulS97 share record
persistent URL:
Ivan Krsul , Eugene H. Spafford : Authorship analysis: identifying the author of a program. Comput. Secur. 16 (3 ) : 233-257 (1997 )export record
dblp key:
journals/compsec/LabuschagneE97 share record
persistent URL:
Les Labuschagne , Jan H. P. Eloff : Improved system-access control using complementary technologies. Comput. Secur. 16 (6 ) : 543-549 (1997 )share record
persistent URL:
John Meyer : From the editor. Comput. Secur. 16 (1 ) : 2-3 (1997 )export record
dblp key:
journals/compsec/Meyer97a share record
persistent URL:
John Meyer : Professor Harold Joseph Highland FICS, FACM. Comput. Secur. 16 (5 ) : 350-355 (1997 )export record
dblp key:
journals/compsec/Molini97 share record
persistent URL:
James E. Molini : Electronic borders: Defining and protecting national networks. Comput. Secur. 16 (3 ) : 189-196 (1997 )export record
dblp key:
journals/compsec/Mulhall97 share record
persistent URL:
Tom Mulhall : Where have all the hackers gone? A study in motivation, deterrence, and crime displacement: Part 1 - introduction & methodology. Comput. Secur. 16 (4 ) : 277-284 (1997 )export record
dblp key:
journals/compsec/Mulhall97a share record
persistent URL:
Tom Mulhall : Where have all the hackers gone?: Part 2 - Frequency of computer related abuse: the surveys, and public perception of the problem. Comput. Secur. 16 (4 ) : 285-290 (1997 )export record
dblp key:
journals/compsec/Mulhall97b share record
persistent URL:
Tom Mulhall : Where have all the hackers gone?: Part 3 - Motivation and deterrence. Comput. Secur. 16 (4 ) : 291-297 (1997 )export record
dblp key:
journals/compsec/Mulhall97c share record
persistent URL:
Tom Mulhall : Where have all the hackers gone?: Part 4 - Legislation. Comput. Secur. 16 (4 ) : 298-303 (1997 )export record
dblp key:
journals/compsec/Mulhall97d share record
persistent URL:
Tom Mulhall : Where have all the hackers gone?: Part 5 - Conclusions. Comput. Secur. 16 (4 ) : 304-306 (1997 )export record
dblp key:
journals/compsec/Mulhall97e share record
persistent URL:
Tom Mulhall : Where have all the hackers gone?: Part 6 - Appendices and bibliography. Comput. Secur. 16 (4 ) : 307-315 (1997 )export record
dblp key:
journals/compsec/Parker97 share record
persistent URL:
Donn B. Parker : The strategic values of information security in business. Comput. Secur. 16 (7 ) : 572-582 (1997 )export record
dblp key:
journals/compsec/Pounder97 share record
persistent URL:
Chris Pounder : First steps towards a european union policy on the securing of electronic communications. Comput. Secur. 16 (7 ) : 590-594 (1997 )export record
dblp key:
journals/compsec/Ratnasingham97 share record
persistent URL:
Pauline Ratnasingham : EDI security - re-evaluation of controls and its implications on the organizations. Comput. Secur. 16 (8 ) : 650-656 (1997 )export record
dblp key:
journals/compsec/Sherwood97 share record
persistent URL:
John Sherwood : Managing security for outsourcing contracts. Comput. Secur. 16 (7 ) : 603-609 (1997 )share record
persistent URL:
Ben Soh , Tharam S. Dillon : System intrusion processes: a simulation model. Comput. Secur. 16 (1 ) : 71-79 (1997 )export record
dblp key:
journals/compsec/TetteroOFS97 share record
persistent URL:
O. Tettero , D. J. Out , Henry M. Franken , J. Schot : Information security embedded in the design of telematics systems. Comput. Secur. 16 (2 ) : 145-164 (1997 )export record
dblp key:
journals/compsec/VolpanoI97 share record
persistent URL:
Dennis M. Volpano , Cynthia E. Irvine : Secure flow typing. Comput. Secur. 16 (2 ) : 137-144 (1997 )share record
persistent URL:
Chih-Hung Wang , Tzonelih Hwang : Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication. Comput. Secur. 16 (4 ) : 339-344 (1997 )share record
persistent URL:
Charles Cresson Wood : A management view of internet electronic commerce security. Comput. Secur. 16 (4 ) : 316-320 (1997 )share record
persistent URL:
Random bits & bytes. Comput. Secur. 16 (5 ) : 356-364 (1997 ) share record
persistent URL:
From the editor. Comput. Secur. 16 (6 ) : 452-453 (1997 ) share record
persistent URL:
From the editor. Comput. Secur. 16 (7 ) : 570-571 (1997 ) share record
persistent URL:
From the editor. Comput. Secur. 16 (8 ) : 648-649 (1997 )