Journal: Computers & Security

Volume 9, Issue 5

366 -- 378Harold Joseph Highland. Random bits & bytes
379 -- 389Peter Winters. Secure systems design - an evolving national strategy
391 -- 393Hans Gliss. East Germany - haven for software piracy
395 -- 402Charles Cresson Wood. How many information security staff people should you have?
403 -- 407Jon David. The numbers game
411 -- 417Scott K. Jones, Clinton E. White Jr.. The IPM model of computer virus management
431 -- 446Robert A. McKosky, Sajjan G. Shiva. A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems
459 -- 460Roger R. Schell, David Bailey. Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln 40, F.R.G., ISBN 3-89209-000-9, 1989