


default search action
Computers & Security, Volume 16
Volume 16, Number 1, 1997
- John Meyer:

From the editor. 2-3 - Harold Joseph Highland:

Random bits & bytes & bytes. 4-13 - Gerald L. Kovacich:

Information warfare and the information systems security professional. 14-24 - Brian Boyce:

Cyber extortion - The corporate response. 25-28 - Fred Cohen:

Information system attacks: A preliminary classification scheme. 29-46 - Harold Joseph Highland:

Current literature The 19th National Information Systems Security Conference. 47-59 - Ben Soh, Tharam S. Dillon:

System intrusion processes: a simulation model. 71-79
Volume 16, Number 2, 1997
- Fred Cohen:

Information system defences: A preliminary classification scheme. 94-114 - Stephane G. Bouniol:

The puzzle theorem - The less I know, the less I can disclose ... 115-125 - Dennis M. Volpano, Cynthia E. Irvine:

Secure flow typing. 137-144 - O. Tettero, D. J. Out, Henry M. Franken, J. Schot:

Information security embedded in the design of telematics systems. 145-164
Volume 16, Number 3, 1997
- James E. Molini:

Electronic borders: Defining and protecting national networks. 189-196 - Thomas Finne:

What are the information security risks in decision support systems and data warehousing? 197-204 - Harold Joseph Highland:

IFIP/SEC'97 conference proceedings. 205 - Zbigniew Ciechanowicz:

Risk analysis: requirements, conflicts and problems. 223-232 - Ivan Krsul, Eugene H. Spafford:

Authorship analysis: identifying the author of a program. 233-257
Volume 16, Number 4, 1997
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 16(4): 266-275 (1997) - Tom Mulhall:

Where have all the hackers gone? A study in motivation, deterrence, and crime displacement: Part 1 - introduction & methodology. 277-284 - Tom Mulhall:

Where have all the hackers gone?: Part 2 - Frequency of computer related abuse: the surveys, and public perception of the problem. 285-290 - Tom Mulhall:

Where have all the hackers gone?: Part 3 - Motivation and deterrence. 291-297 - Tom Mulhall:

Where have all the hackers gone?: Part 4 - Legislation. 298-303 - Tom Mulhall:

Where have all the hackers gone?: Part 5 - Conclusions. 304-306 - Tom Mulhall:

Where have all the hackers gone?: Part 6 - Appendices and bibliography. 307-315 - Charles Cresson Wood:

A management view of internet electronic commerce security. 316-320 - Gerald L. Kovacich:

The ISSO must understand the business and management environment. 321-326 - Chih-Hung Wang, Tzonelih Hwang:

Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication. 339-344
Volume 16, Number 5, 1997
- John Meyer:

Professor Harold Joseph Highland FICS, FACM. 350-355 - Random bits & bytes. 356-364

- Harold Joseph Highland:

The threats on the web. 365-368 - Harold Joseph Highland:

Data encryption: A non-mathematical approach. 369-386 - Harold Joseph Highland:

Historical bits & bytes. 387-411 - Harold Joseph Highland:

A history of computer viruses - Introduction. 412-415 - Harold Joseph Highland:

A history of computer viruses - The famous 'trio'. 416-429 - Harold Joseph Highland:

A history of computer viruses: Three special viruses. 430-438 - Harold Joseph Highland:

Procedures to reduce the computer virus threat. 439-449
Volume 16, Number 6, 1997
- From the editor. 452-453

- Gerald L. Kovacich:

ISSO career development. 455-458 - Thomas Finne:

Information security implemented in: The theory on stock market efficiency, Markowitz's portfolio theory and porter's value chain. 469-479 - Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic:

Two-phase cryptographic key recovery system. 481-506 - Les Labuschagne

, Jan H. P. Eloff:
Improved system-access control using complementary technologies. 543-549 - Simon N. Foley:

Building Chinese walls in standard unixTM. 551-563
Volume 16, Number 7, 1997
- From the editor. 570-571

- Donn B. Parker:

The strategic values of information security in business. 572-582 - Nigel Hickson:

Encryption policy - A UK perspective. 583-589 - Chris Pounder:

First steps towards a european union policy on the securing of electronic communications. 590-594 - Andy Jones:

Penetration testing and system audit - experience gained during the investigation of systems within the UK. 595-602 - John Sherwood:

Managing security for outsourcing contracts. 603-609 - Gerald L. Kovacich:

Information systems security metrics management. 610-618 - Julie Bunnell, John Podd, Ron Henderson, Renee Napier, James Kennedy-Moffat:

Cognitive, associative and conventional passwords: Recall and guessing rates. 629-641
Volume 16, Number 8, 1997
- From the editor. 648-649

- Pauline Ratnasingham:

EDI security - re-evaluation of controls and its implications on the organizations. 650-656 - Gerald L. Kovacich:

How to market yourself as an ISSO. 657-662 - Alasdair Kemp:

Embedded systems: The other problem. 663-668 - Andrew J. Clark:

Key recovery - why, how, who?. 669-674 - Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf:

Protecting databases from inference attacks. 687-708 - Dimitris Gritzalis:

A baseline security policy for distributed healthcare information systems. 709-719

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














