- Donn B. Parker:
Demonstrating the Elements of Information Security with Loss Scenarios. Inf. Secur. J. A Glob. Perspect. 3(1): 17-22 (1994) - Donn B. Parker:
From the Editor. Inf. Secur. J. A Glob. Perspect. 3(2): 3 (1994) - Donn B. Parker:
A Guide to Selecting and Implementing Security Controls. Inf. Secur. J. A Glob. Perspect. 3(2): 75-86 (1994) - Donn B. Parker:
From the Editor. Inf. Secur. J. A Glob. Perspect. 3(3): 3-4 (1994) - Donn B. Parker:
Update on Cryptography: Who Will Keep the Keys? Inf. Secur. J. A Glob. Perspect. 3(3): 16-22 (1994) - Joseph Piazza:
A Multilevel Strategy for Combatting Viruses. Inf. Secur. J. A Glob. Perspect. 3(3): 45-52 (1994) - Ralph Spencer Poore:
Reference Monitor Technology: Watching Your Every Keystroke. Inf. Secur. J. A Glob. Perspect. 3(2): 65-74 (1994) - Ralph Spencer Poore:
Remembered Secrets: Multisession Systems, LANs, and Other Hiding Places. Inf. Secur. J. A Glob. Perspect. 3(3): 23-26 (1994) - Larry Runge:
Security and Data Integrity in a Client-Server Environment. Inf. Secur. J. A Glob. Perspect. 3(1): 45-56 (1994) - Robert E. Smith:
Proactive Solutions for Multinetwork Security. Inf. Secur. J. A Glob. Perspect. 3(2): 47-55 (1994) - Michael I. Sobol:
Products for Media Backup and Recovery. Inf. Secur. J. A Glob. Perspect. 3(1): 25-30 (1994) - Michael I. Sobol:
Anti-Virus Software. Inf. Secur. J. A Glob. Perspect. 3(2): 24-29 (1994) - Michael I. Sobol:
Data Encryption. Inf. Secur. J. A Glob. Perspect. 3(3): 27-31 (1994) - Martha Stansell-Gamm:
Responding to Computer Crime: A Security Practitioner's Guide. Inf. Secur. J. A Glob. Perspect. 3(2): 56-64 (1994) - Geoffrey W. Turner:
Cryptography: Beyond Computer Crime. Inf. Secur. J. A Glob. Perspect. 3(2): 20-23 (1994)