Journal: Computers & Security

Volume 7, Issue 4

334 -- 0Harold Joseph Highland. From the editor
335 -- 336Frederick Cohen. Ethical issues in computer virus distribution
337 -- 0Harold Joseph Highland. How to obtain a computer virus
338 -- 0Harold Joseph Highland. Are virus attack statistics reliable?
339 -- 0Harold Joseph Highland. Hackers revisited
340 -- 0Harold Joseph Highland. New video terminal law
341 -- 0Harold Joseph Highland. Electromagnetic eavesdropping machines for christmas?
344 -- 0Harold Joseph Highland. Tips on terrorism
344 -- 345Harold Joseph Highland. Investigating a reported virus attack
345 -- 0Harold Joseph Highland. Virus filter update
347 -- 352C. Wayne Madsen. The world meganetwork and terrorism
353 -- 355Jack Bologna. Selection risks in hiring information systems personnel
357 -- 360Harold Joseph Highland. The anatomy of a DOS Disk
361 -- 366Belden Menkus. U.S. Government agencies belatedly address information system security issues
367 -- 370Harold Joseph Highland. The brain virus: Fact and fantasy
373 -- 385Rita C. Summers, Stanley A. Kurzban. Potential applications of knowledge-based methods to computer security
387 -- 396John McHugh, Bhavani M. Thuraisingham. Multilevel security issues in distributed database management systems
397 -- 408Ian H. Witten, John G. Cleary. On the privacy afforded by adaptive text compression
409 -- 414Fred Cohen, Stephen Bruhns. Two secure file servers
423 -- 434. Abstracts of recent articles and literature