Journal: Computers & Security

Volume 16, Issue 8

650 -- 656Pauline Ratnasingham. EDI security - re-evaluation of controls and its implications on the organizations
657 -- 662Gerald L. Kovacich. How to market yourself as an ISSO
663 -- 668Alasdair Kemp. Embedded systems: The other problem
669 -- 674Andrew J. Clark. Key recovery - why, how, who?
687 -- 708Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf. Protecting databases from inference attacks
709 -- 719Dimitris Gritzalis. A baseline security policy for distributed healthcare information systems