Journal: Computers & Security

Volume 5, Issue 3

179 -- 180Harold Joseph Highland. In this issue ..
181 -- 184Harold Joseph Highland, Viiveke Fåk. Electromagnetic radiation revisited, part II
193 -- 200Charles Cresson Wood. Establishing internal technical systems security standards
201 -- 206John G. Beatson. Managing the EDP audit and security functions
207 -- 210Roy Martin Richards Jr.. Insuring computer risks
211 -- 217Lance J. Hoffman, Lucy M. Moran. Societal vulnerability to computer system failures
218 -- 242Frederick G. Tompkins, Russell S. Rice. Integrating security activities into the software development life cycle and the software quality assurance process
243 -- 250G. M. J. Pluimakers, J. van Leeuwen. Authentication: A concise survey
251 -- 256Yeheskel Lapid, Niv Ahituv, Seev Neumann. Approaches to handling "Trojan Horse" threats