researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
10
, Issue
3
184
--
188
Harold Joseph Highland
.
A non-mathematical view of encryption
189
--
190
Harold Joseph Highland
.
Evaluating an encryption package
190
--
191
Harold Joseph Highland
.
Computers under attack
191
--
195
Harold Joseph Highland
.
Microcomputer utilities
195
--
198
Harold Joseph Highland
.
NTIS volumes of interest
199
--
203
Belden Menkus
.
How to begin dealing with computer security
205
--
212
Simon Banks
.
Understanding IBM s CICS systems to improve security
213
--
216
Stewart Kowalski
.
The ABCs and Es of national computer security policies
217
--
227
Stewart Kowalski
.
Cybernetic analysis of national computer security
228
--
235
Stewart Kowalski
.
Cybernetic analysis of the 12th U.S. National Computer Security Conference
239
--
250
Frederick B. Cohen
.
A cost analysis of typical computer viruses and defenses
251
--
261
Ronald Paans
,
Hans de Lange
.
Auditing the SNA/SNI environment
263
--
267
Denis Laurichesse
,
Laurent Blain
.
Optimized implementation of RSA cryptosystem
271
--
275
R. J. Allen
.
Trusted ORACLE - multilevel secure data management for military computing