


default search action
Computers & Security, Volume 2
Volume 2, Number 1, January 1983
- Harold Joseph Highland:

Editorial. 1-2 - Charles Cresson Wood:

Effective information system security with password controls. 5-10 - Belden Menkus:

Notes on terrorism and data processing. 11-15 - William Hugh Murray:

Computer security: Observations on the state of the technology. 16-23 - John M. Carroll, Oi-Lun Wu:

Methodology for security analysis of data-processing systems. 24-34 - Nigel Backwith:

Unique approach to security evaluation. 35-40 - Fred W. Weingarten:

Controlling cryptographic publication. 41-48 - U. Bussolati, Giancarlo Martella:

Towards a new approach to secure database design. 49-62 - Bruce Goldstein:

Computer crime and its prevention. 63-66 - Michael J. Cerullo:

Data communications controls. 67-72 - Carl Steve Guynes:

EFTS impact on computer security. 73-77 - David R. Callaghan:

Securing the distributed word processing network. 78-81
- Harold Joseph Highland:

The hut six story: Breaking the Enigma codes : Gordon Welchman: London: Allen Lane (Penguin Books, Ltd) and New York: McGraw Hill Book Co., Inc., 1982. x + 326 pp., $12.95. 82-83 - Harold Joseph Highland:

CBEMA privacy and security bibliography (October 1982) : Rein Turn, editor: Washington DC: Computer and Business Equipment Manufacturers Association, 1982, iii + 51 pp. 83 - Harold Joseph Highland:

Codes, ciphers and computers: An introduction to information security : Bruce Bosworth: Rochelle Park NJ: Hayden Book Company, Inc., 1982. viii + 259 pp., $13.95. 83-84 - Harold Joseph Highland:

Tutorial: The security of data in networks : Donald W. Davies: Silver Spring MD: IEEE Computer Society, 1981. vi + 241 pp., $20.00 to non-members and $15.00 to members of IEEE. 84 - Harold Joseph Highland:

Advances in computer system security : Rein Turn, editor: Dedham MA: ARTECH HOUSE, Inc., 1981. vi + 403 pp. (Q.E.D. Information Sciences, PO Box 181, Wellesley, MA 02181, USA) $29.50. 84
Volume 2, Number 2, June 1983
- William A. J. Bound, Dennis R. Ruth:

Making risk analysis a useful management tool with microcomputer electronic worksheet packages. 102-115 - Kristian Beckman:

IFIP's first security congress : The multi-million step. 117-119 - Andrew D. Warren:

Evaluating the risks of computer fraud and error. 132-143 - Ronald Paans, Guus Bonnes:

Surreptitious security violation in the MVS operating system. 144-152 - David A. Bonyun:

The use of architectural principles in the design of certifiably secure systems. 153-162 - Per L. Hoving:

To install an Access Control System, activities and checklists. 163-170 - Harold Joseph Highland:

Impact of microcomputers on total computer security. 171-183 - Esther H. Highland:

Computer Security Techniques: List of controls by cost. 189-193
Volume 2, Number 3, November 1983
- Harold Joseph Highland:

Editorial. 213 - Jerome Lobel:

The state-of-the-art in computer security. 218-222 - Charles Cresson Wood:

Enhancing information security with the information resource management approach. 223-229 - John M. Carroll:

Decision support for risk analysis. 230-236 - Brian G. P. Fry, William F. Main:

A conceptual methodology for evaluating security requirements for data assets. 237-241 - Harvey S. Koch:

Implementing an integrated test facility audit using differential files. 242-247 - H. Rex Hartson:

Teaching protection in computing: A research-oriented graduate course. 248-255 - Jan H. P. Eloff:

Selection process for security packages. 256-260 - F. Ayoub:

The design of complete encryption networks using cryptographically equivalent permutations. 261-267 - Arthur Sorkin:

Requirements for a secure terminal switch. 268-274 - Norman R. Bottom Jr.:

An informational theory of security. 275-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














