researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
9
, Issue
5
366
--
378
Harold Joseph Highland
.
Random bits & bytes
379
--
389
Peter Winters
.
Secure systems design - an evolving national strategy
391
--
393
Hans Gliss
.
East Germany - haven for software piracy
395
--
402
Charles Cresson Wood
.
How many information security staff people should you have?
403
--
407
Jon David
.
The numbers game
411
--
417
Scott K. Jones
,
Clinton E. White Jr.
.
The IPM model of computer virus management
431
--
446
Robert A. McKosky
,
Sajjan G. Shiva
.
A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems
459
--
460
Roger R. Schell
,
David Bailey
.
Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln 40, F.R.G., ISBN 3-89209-000-9, 1989