Journal: Computers & Security

Volume 1, Issue 3

201 -- 209William Hugh Murray. Security procedures for program libraries
210 -- 215James K. Shaw, Stuart W. Katzke. An executive guide to ADP contingency planning
216 -- 225Leslie D. Ball, Gail Dentch, Mary Emerson, Martha Lewis, Susan McWhorter, Frank Turgeon. Disaster recovery services
226 -- 230Christer Lindén, Hans Block. Sealing electronic money in Sweden
231 -- 232Susan K. Reed, Dennis K. Branstad. Reflections on ten years of computer security
242 -- 0Harold Joseph Highland. Editor's note
243 -- 244Michael Willett. Guest editorial
245 -- 248David Kahn. The grand lines of cryptology's development
249 -- 254R. Creighton Buck. The public cryptography study group
255 -- 260Dennis K. Branstad, Miles E. Smid. Integrity and security standards based on cryptography
261 -- 267Subodh K. Banerjee. High speed implementation of DES
268 -- 274Brian P. Schanning. Applying public key distribution to local area networks
275 -- 289N. S. Jayant. Analog scramblers for speech privacy
290 -- 291. Management guide to computer security : J.P. Talbot: New York: John Wiley and Sons, 1981. xi + 180 pp. $29.95
291 -- 292. Multi-national computer systems: An introduction to transnational data flow and data regulation : Harry S. Katzan, Jr.: New York: Van Nostrand Reinhold Co., 1980. xii + 198 pp. $16.95