researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
7
, Issue
2
114
--
0
Harold Joseph Highland
.
From the editor
129
--
130
William A. J. Bound
.
Discussing security with top management
131
--
132
Bernard P. Zajac Jr.
.
Personnel: The other half of data security
132
--
136
Belden Menkus
.
Understanding the use of passwords
137
--
138
G. J. Bologna
.
Pitfalls in measuring MIS performance
139
--
145
William Hugh Murray
.
The application of epidemiology to computer viruses
145
--
150
Harold Joseph Highland
.
Anatomy of a virus attack
151
--
155
Viiveke Fåk
.
Are we vulnerable to a virus attack? A report from Sweden
157
--
161
Harold Joseph Highland
.
An overview of 18 virus protection products
157
--
0
Harold Joseph Highland
.
How to combat a computer virus
167
--
184
Fred Cohen
.
On the implications of computer viruses and methods of defense
185
--
195
Detmar W. Straub Jr.
.
Organizational structuring of the computer security function
197
--
203
I. S. Herschberg
.
Make the tigers hunt for you
213
--
223
.
Abstracts of recent articles and literature