Journal: Computers & Security

Volume 1, Issue 2

95 -- 0Harold Joseph Highland. Editorial
99 -- 112Robert H. Courtney Jr.. A systematic approach to data security
113 -- 122Rolf Blom, Jan-Olof Brüer, Viiveke Fåk, S. Ingvar Åkersten. On security measures in distributed computer systems
123 -- 138John M. Carroll. The control of computer-based fraud
139 -- 145Charles Cresson Wood. Policies for deterring computer abuse
146 -- 151Rolf Moulton. A multidisciplinary approach to the investigation of computer abuse incidents
152 -- 163William Neugent. Teaching computer security: A course outline
164 -- 176Esther Harris Highland, Harold Joseph Highland. A guide to NBS computer security literature
177 -- 186Michael Willett. Cryptography old and new
191 -- 0Harold Joseph Highland. Managing information security: A program for the electronic information age : James A. Schweitzer Boston: Butterworth (Publishers), Inc., 1982. vi + 133 pp. $15.95
191 -- 192Harold Joseph Highland. Management guide to computer security : J.R. Talbot New York: John Wiley & Sons, 1981. xi + 180 pp. $29.95
192 -- 0Esther H. Highland. System security standard for electronic data processing : Rolf Moulton New York: The city of New York, 1981. $7.50