| 201 | -- | 209 | William Hugh Murray. Security procedures for program libraries |
| 210 | -- | 215 | James K. Shaw, Stuart W. Katzke. An executive guide to ADP contingency planning |
| 216 | -- | 225 | Leslie D. Ball, Gail Dentch, Mary Emerson, Martha Lewis, Susan McWhorter, Frank Turgeon. Disaster recovery services |
| 226 | -- | 230 | Christer Lindén, Hans Block. Sealing electronic money in Sweden |
| 231 | -- | 232 | Susan K. Reed, Dennis K. Branstad. Reflections on ten years of computer security |
| 242 | -- | 0 | Harold Joseph Highland. Editor's note |
| 243 | -- | 244 | Michael Willett. Guest editorial |
| 245 | -- | 248 | David Kahn. The grand lines of cryptology's development |
| 249 | -- | 254 | R. Creighton Buck. The public cryptography study group |
| 255 | -- | 260 | Dennis K. Branstad, Miles E. Smid. Integrity and security standards based on cryptography |
| 261 | -- | 267 | Subodh K. Banerjee. High speed implementation of DES |
| 268 | -- | 274 | Brian P. Schanning. Applying public key distribution to local area networks |
| 275 | -- | 289 | N. S. Jayant. Analog scramblers for speech privacy |
| 290 | -- | 291 | . Management guide to computer security : J.P. Talbot: New York: John Wiley and Sons, 1981. xi + 180 pp. $29.95 |
| 291 | -- | 292 | . Multi-national computer systems: An introduction to transnational data flow and data regulation : Harry S. Katzan, Jr.: New York: Van Nostrand Reinhold Co., 1980. xii + 198 pp. $16.95 |