Journal: Computers & Security

Volume 6, Issue 6

445 -- 446Harold Joseph Highland. From the editor
447 -- 0Harold Joseph Highland. New member of the International Board of Editors
448 -- 0Harold Joseph Highland. Computer abuse and managerial response
449 -- 451Harold Joseph Highland. Data cartridge for secure data
451 -- 452Harold Joseph Highland. Passwords revisited
452 -- 457Harold Joseph Highland. Office automation security
457 -- 458Harold Joseph Highland. Tempest over leaking computers
458 -- 462Harold Joseph Highland. Hard disk recovery tools
463 -- 0Harold Joseph Highland. Random notes
464 -- 470Sidney L. Smith. Authenticating users by word association
471 -- 478Bruce J. Baird, Lindsay L. Baird Jr., Ronald P. Ranauro. The moral cracker?
479 -- 492Bhavani M. Thuraisingham. Security checking in relational database management systems augmented with inference engines
493 -- 504Sergio B. Guarro. Principles and procedures of the LRAM approach to information systems risk analysis and management
505 -- 510Fred Cohen. A cryptographic checksum for integrity protection
511 -- 516Charles Cresson Wood. The human immune system as an information systems security reference model