Journal: Computers & Security

Volume 7, Issue 1

3 -- 5Harold Joseph Highland. Case history of a virus attack
5 -- 6Harold Joseph Highland. Encryption, attacks and ethics
6 -- 7Harold Joseph Highland. How to protect a microcomputer system
7 -- 9Harold Joseph Highland. Chernobyl computer communications
9 -- 10Harold Joseph Highland. Electromagnetic interference
10 -- 0Harold Joseph Highland. IFIP/Sec '88
10 -- 11Harold Joseph Highland. For your information
13 -- 18Harold Joseph Highland. Product reviews
19 -- 23Robert H. Courtney Jr.. Another perspective on sensitive but unclassified data
25 -- 26Harold Joseph Highland. How secure are fiber optics communications?
27 -- 34Harold Joseph Highland. Secretdisk II - transparent automatic encryption
35 -- 36Bernard P. Zajac Jr.. Dial-up communication lines: Can they be secured?
37 -- 43Harold Joseph Highland. Program aids for office automation security
47 -- 52Belden Menkus. Getting started in data processing disaster recovery
53 -- 57Ellen Amsel. Network security and access controls
59 -- 63Niv Ahituv, Yeheskel Lapid, Seev Neumann. Protecting statistical databases against retrieval of private information
65 -- 71Per Christoffersson. Message authentication and encryption combined
73 -- 82Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley. Element-level classification with A1 assurance
83 -- 87Arto Salomaa. A public-key cryptosystem based on language theory
101 -- 110. Abstracts of recent articles and literature