Journal: Computers & Security

Volume 5, Issue 1

1 -- 0Harold Joseph Highland. In this issue..
11 -- 16Bernard P. Zajac Jr.. What to do when you have reason to believe your computer has been compromised
17 -- 23A. Kinnon, Robert H. Davis. Audit and security implications of electronic funds transfer
24 -- 27Ted Goeltz. Why not DES?
28 -- 35Robert M. Harper Jr.. Internal control in local area networks: An accountant's perspective
36 -- 45R. van den Assem, W. J. van Elk. A chosen-plaintext attack on the microsoft BASIC protection
46 -- 54Ronald Paans, I. S. Herschberg. How to control MVS user supervisor calls
68 -- 72Kenneth Owen. Computer security: IFIP addresses the practical issues
74 -- 79Per L. Hoving. System security: The technical challenge