Journal: Computers & Security

Volume 10, Issue 3

184 -- 188Harold Joseph Highland. A non-mathematical view of encryption
189 -- 190Harold Joseph Highland. Evaluating an encryption package
190 -- 191Harold Joseph Highland. Computers under attack
191 -- 195Harold Joseph Highland. Microcomputer utilities
195 -- 198Harold Joseph Highland. NTIS volumes of interest
199 -- 203Belden Menkus. How to begin dealing with computer security
205 -- 212Simon Banks. Understanding IBM s CICS systems to improve security
213 -- 216Stewart Kowalski. The ABCs and Es of national computer security policies
217 -- 227Stewart Kowalski. Cybernetic analysis of national computer security
228 -- 235Stewart Kowalski. Cybernetic analysis of the 12th U.S. National Computer Security Conference
239 -- 250Frederick B. Cohen. A cost analysis of typical computer viruses and defenses
251 -- 261Ronald Paans, Hans de Lange. Auditing the SNA/SNI environment
263 -- 267Denis Laurichesse, Laurent Blain. Optimized implementation of RSA cryptosystem
271 -- 275R. J. Allen. Trusted ORACLE - multilevel secure data management for military computing