researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
12
, Issue
7
612
--
622
Harold Joseph Highland
.
Random bits & bytes
623
--
626
Martin Plant
.
Getting management buy-in to IT security
627
--
628
Edwin B. Heinlein
.
I worked with Murphy
629
--
633
Brian S. Collins
,
Steve Mathews
.
Securing your business process
634
--
639
Harold Joseph Highland
.
A view of information security tomorrow
640
--
645
William J. Caelli
,
Ian G. Graham
,
Luke O Connor
.
Cryptographic Application Programming Interfaces (APIs)
657
--
662
Mohammad S. Obaidat
.
A methodology for improving computer access security
663
--
678
Charles Cresson Wood
.
Principles of secure information systems design with groupware examples
679
--
689
Marshall D. Abrams
,
Edward Amoroso
,
Leonard J. LaPadula
,
Teresa F. Lunt
,
James G. Williams
.
Report of an integrity research study group