Journal: Computers & Security

Volume 7, Issue 2

114 -- 0Harold Joseph Highland. From the editor
129 -- 130William A. J. Bound. Discussing security with top management
131 -- 132Bernard P. Zajac Jr.. Personnel: The other half of data security
132 -- 136Belden Menkus. Understanding the use of passwords
137 -- 138G. J. Bologna. Pitfalls in measuring MIS performance
139 -- 145William Hugh Murray. The application of epidemiology to computer viruses
145 -- 150Harold Joseph Highland. Anatomy of a virus attack
151 -- 155Viiveke Fåk. Are we vulnerable to a virus attack? A report from Sweden
157 -- 161Harold Joseph Highland. An overview of 18 virus protection products
157 -- 0Harold Joseph Highland. How to combat a computer virus
167 -- 184Fred Cohen. On the implications of computer viruses and methods of defense
185 -- 195Detmar W. Straub Jr.. Organizational structuring of the computer security function
197 -- 203I. S. Herschberg. Make the tigers hunt for you
213 -- 223. Abstracts of recent articles and literature