Journal: Computers & Security

Volume 7, Issue 3

228 -- 0Harold Joseph Highlands. From the editor
232 -- 233Harold Joseph Highland. Open Sesame-Hackers welcome
233 -- 235Harold Joseph Highland. Security director's dilemma
235 -- 237Harold Joseph Highland. How to test a virus filter without a virus
237 -- 239Harold Joseph Highland. Blitzed by a computer virus
237 -- 0Harold Joseph Highland. Virus disaster red book
239 -- 242Harold Joseph Highland. Special virus protection measures
242 -- 243Harold Joseph Highland. Upcoming conferences of note
243 -- 244Harold Joseph Highland. Star wars security or where did those micros go?
245 -- 247Jack Bologna. Managing an information system crisis
249 -- 250Bernard P. Zajac Jr.. Distributed data processing: New problems
251 -- 253G. Will Milor. The computer security act of 1987
255 -- 258Jon David. Treating viral fever
261 -- 268Belden Menkus. Breakpoints
271 -- 277Margaret E. van Biene-Hershey. The technical EDP-audit function
279 -- 286Fred Cohen. Designing provably correct information networks with digital diodes
287 -- 298G. M. J. Pluimakers. Some notes on authorization and transaction management in distributed database systems
299 -- 303Dirk Van der Bank, Edwin Anderssen. Cryptographic figures of merit
309 -- 311Harold Joseph Highland. Report on the fourth national computer security conference: COMPSEC IV
312 -- 315Ronald Paans. The second European conference on computer audit, control and security
320 -- 331. Abstracts of recent articles and literature